idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash string | file_name string | file_hash string | cwe string | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
194,963 | ImageMagick6 | dc070da861a015d3c97488fdcca6063b44d47a7b | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b | https://github.com/ImageMagick/ImageMagick/pull/5034 | 1 | static MagickBooleanType GetEXIFProperty(const Image *image,
const char *property)
{
#define MaxDirectoryStack 16
#define EXIF_DELIMITER "\n"
#define EXIF_NUM_FORMATS 12
#define EXIF_FMT_BYTE 1
#define EXIF_FMT_STRING 2
#define EXIF_FMT_USHORT 3
#define EXIF_FMT_ULONG 4
#define EXIF_FMT_URATIONAL 5
#define EX... | 292096308156704952246887123009503225331 | property.c | 122751008107964047346147343124174074065 | CWE-704 | CVE-2022-32547 | In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other probl... | https://nvd.nist.gov/vuln/detail/CVE-2022-32547 |
217,569 | ImageMagick6 | dc070da861a015d3c97488fdcca6063b44d47a7b | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b | https://github.com/ImageMagick/ImageMagick/pull/5034 | 0 | static MagickBooleanType GetEXIFProperty(const Image *image,
const char *property)
{
#define MaxDirectoryStack 16
#define EXIF_DELIMITER "\n"
#define EXIF_NUM_FORMATS 12
#define EXIF_FMT_BYTE 1
#define EXIF_FMT_STRING 2
#define EXIF_FMT_USHORT 3
#define EXIF_FMT_ULONG 4
#define EXIF_FMT_URATIONAL 5
#define EX... | 75422468811560646183620950160304672170 | property.c | 320426917520707901134127411021604962567 | CWE-704 | CVE-2022-32547 | In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other probl... | https://nvd.nist.gov/vuln/detail/CVE-2022-32547 |
194,989 | ImageMagick6 | 450949ed017f009b399c937cf362f0058eacc5fa | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa | Pull request: https://github.com/ImageMagick/ImageMagick/pull/4963 | 1 | static MagickBooleanType ReadPSDChannelPixels(Image *image,
const size_t channels,const ssize_t row,const ssize_t type,
const unsigned char *pixels,ExceptionInfo *exception)
{
Quantum
pixel;
const unsigned char
*p;
IndexPacket
*indexes;
PixelPacket
*q;
ssize_t
x;
size_t
pack... | 50584299779312396054491404176852470969 | psd.c | 159316916509494023086155162326374999236 | CWE-190 | CVE-2022-32545 | A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior. | https://nvd.nist.gov/vuln/detail/CVE-2022-32545 |
218,785 | ImageMagick6 | 450949ed017f009b399c937cf362f0058eacc5fa | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa | Pull request: https://github.com/ImageMagick/ImageMagick/pull/4963 | 0 | static MagickBooleanType ReadPSDChannelPixels(Image *image,
const size_t channels,const ssize_t row,const ssize_t type,
const unsigned char *pixels,ExceptionInfo *exception)
{
Quantum
pixel;
const unsigned char
*p;
IndexPacket
*indexes;
PixelPacket
*q;
ssize_t
x;
size_t
pack... | 177518249272594340059836567736761123364 | psd.c | 226732625250511916284298083592366716300 | CWE-190 | CVE-2022-32545 | A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior. | https://nvd.nist.gov/vuln/detail/CVE-2022-32545 |
194,994 | tensorflow | c79ccba517dbb1a0ccb9b01ee3bd2a63748b60dd | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/c79ccba517dbb1a0ccb9b01ee3bd2a63748b60dd | Fix memory leak when a graph node is invalid.
If a graph node is invalid but a kernel is created then we set the kernel back to `nullptr` but we forget to delete it. Hence, we get a memory leak.
PiperOrigin-RevId: 408968108
Change-Id: I1d8a9d0d8988ed5e08be8b9f2004ce1b4cd11b7c | 1 | Status ImmutableExecutorState::Initialize(const Graph& graph) {
TF_RETURN_IF_ERROR(gview_.Initialize(&graph));
// Build the information about frames in this subgraph.
ControlFlowInfo cf_info;
TF_RETURN_IF_ERROR(BuildControlFlowInfo(&graph, &cf_info));
for (auto& it : cf_info.unique_frame_names) {
Ensure... | 105248557138287586060572648585871722551 | immutable_executor_state.cc | 234046012522402227954780787024760975669 | CWE-401 | CVE-2022-23578 | Tensorflow is an Open Source Machine Learning Framework. If a graph node is invalid, TensorFlow can leak memory in the implementation of `ImmutableExecutorState::Initialize`. Here, we set `item->kernel` to `nullptr` but it is a simple `OpKernel*` pointer so the memory that was previously allocated to it would leak. The... | https://nvd.nist.gov/vuln/detail/CVE-2022-23578 |
218,852 | tensorflow | c79ccba517dbb1a0ccb9b01ee3bd2a63748b60dd | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/c79ccba517dbb1a0ccb9b01ee3bd2a63748b60dd | Fix memory leak when a graph node is invalid.
If a graph node is invalid but a kernel is created then we set the kernel back to `nullptr` but we forget to delete it. Hence, we get a memory leak.
PiperOrigin-RevId: 408968108
Change-Id: I1d8a9d0d8988ed5e08be8b9f2004ce1b4cd11b7c | 0 | Status ImmutableExecutorState::Initialize(const Graph& graph) {
TF_RETURN_IF_ERROR(gview_.Initialize(&graph));
// Build the information about frames in this subgraph.
ControlFlowInfo cf_info;
TF_RETURN_IF_ERROR(BuildControlFlowInfo(&graph, &cf_info));
for (auto& it : cf_info.unique_frame_names) {
Ensure... | 156764801773187472412077288460661715117 | immutable_executor_state.cc | 208458315060777566057381971058447382110 | CWE-401 | CVE-2022-23578 | Tensorflow is an Open Source Machine Learning Framework. If a graph node is invalid, TensorFlow can leak memory in the implementation of `ImmutableExecutorState::Initialize`. Here, we set `item->kernel` to `nullptr` but it is a simple `OpKernel*` pointer so the memory that was previously allocated to it would leak. The... | https://nvd.nist.gov/vuln/detail/CVE-2022-23578 |
194,996 | tensorflow | 4f38b1ac8e42727e18a2f0bde06d3bee8e77b250 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/4f38b1ac8e42727e18a2f0bde06d3bee8e77b250 | Prevent null dereference read in `GetInitOp`.
We have a map of maps. We test that the key exists in the first map but then we don't have any validation that this also means the second map has the needed key. In the scenarios where this is not the case, we'll dereference a nullptr, if we don't have this check
PiperOri... | 1 | Status GetInitOp(const string& export_dir, const MetaGraphDef& meta_graph_def,
string* init_op_name) {
const auto& sig_def_map = meta_graph_def.signature_def();
const auto& init_op_sig_it =
meta_graph_def.signature_def().find(kSavedModelInitOpSignatureKey);
if (init_op_sig_it != sig_def_map... | 90320046309155279319769139363770698236 | loader_util.cc | 223638670651747648145854147173893848422 | CWE-476 | CVE-2022-23577 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `GetInitOp` is vulnerable to a crash caused by dereferencing a null pointer. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also aff... | https://nvd.nist.gov/vuln/detail/CVE-2022-23577 |
218,933 | tensorflow | 4f38b1ac8e42727e18a2f0bde06d3bee8e77b250 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/4f38b1ac8e42727e18a2f0bde06d3bee8e77b250 | Prevent null dereference read in `GetInitOp`.
We have a map of maps. We test that the key exists in the first map but then we don't have any validation that this also means the second map has the needed key. In the scenarios where this is not the case, we'll dereference a nullptr, if we don't have this check
PiperOri... | 0 | Status GetInitOp(const string& export_dir, const MetaGraphDef& meta_graph_def,
string* init_op_name) {
const auto& sig_def_map = meta_graph_def.signature_def();
const auto& init_op_sig_it =
meta_graph_def.signature_def().find(kSavedModelInitOpSignatureKey);
if (init_op_sig_it != sig_def_map... | 120370294428908534368713689048437773064 | loader_util.cc | 225205642200693417259460288987767726126 | CWE-476 | CVE-2022-23577 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `GetInitOp` is vulnerable to a crash caused by dereferencing a null pointer. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also aff... | https://nvd.nist.gov/vuln/detail/CVE-2022-23577 |
194,998 | tensorflow | 240655511cd3e701155f944a972db71b6c0b1bb6 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/240655511cd3e701155f944a972db71b6c0b1bb6 | Eliminate `CHECK`-fails from `IsSimplifiableReshape` via `MakeShape(<invalid shape>)`
PiperOrigin-RevId: 409166738
Change-Id: I7f0a3590b8acae3f3e3e2fe636e1f5ef285693cf | 1 | Status ConstantFolding::IsSimplifiableReshape(
const NodeDef& node, const GraphProperties& properties) const {
if (!IsReshape(node)) {
return errors::Internal("Node ", node.name(), " is not a Reshape node");
}
if (2 > node.input_size()) {
return errors::Internal("Node ", node.name(),
... | 122664089420988233915419567191040959656 | constant_folding.cc | 35061507297230918846503076104140700863 | CWE-617 | CVE-2022-23581 | Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that `IsSimplifiableReshape` would trigger `CHECK` failures. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorF... | https://nvd.nist.gov/vuln/detail/CVE-2022-23581 |
219,032 | tensorflow | 240655511cd3e701155f944a972db71b6c0b1bb6 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/240655511cd3e701155f944a972db71b6c0b1bb6 | Eliminate `CHECK`-fails from `IsSimplifiableReshape` via `MakeShape(<invalid shape>)`
PiperOrigin-RevId: 409166738
Change-Id: I7f0a3590b8acae3f3e3e2fe636e1f5ef285693cf | 0 | Status ConstantFolding::IsSimplifiableReshape(
const NodeDef& node, const GraphProperties& properties) const {
if (!IsReshape(node)) {
return errors::Internal("Node ", node.name(), " is not a Reshape node");
}
if (2 > node.input_size()) {
return errors::Internal("Node ", node.name(),
... | 262760907526734396914090099303096262406 | constant_folding.cc | 271606694375277711450004865336349725435 | CWE-617 | CVE-2022-23581 | Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that `IsSimplifiableReshape` would trigger `CHECK` failures. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorF... | https://nvd.nist.gov/vuln/detail/CVE-2022-23581 |
195,017 | gpac | ad18ece95fa064efc0995c4ab2c985f77fb166ec | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/ad18ece95fa064efc0995c4ab2c985f77fb166ec | fixed #1904 | 1 | u32 GetHintFormat(GF_TrackBox *trak)
{
GF_HintMediaHeaderBox *hmhd = (GF_HintMediaHeaderBox *)trak->Media->information->InfoHeader;
if (hmhd->type != GF_ISOM_BOX_TYPE_HMHD)
return 0;
if (!hmhd || !hmhd->subType) {
GF_Box *a = (GF_Box *)gf_list_get(trak->Media->information->sampleTable->SampleDescription->chil... | 91218268849686441388880855658517990203 | hint_track.c | 60176895274654779679144452624639678766 | CWE-476 | CVE-2021-40576 | The binary MP4Box in Gpac 1.0.1 has a null pointer dereference vulnerability in the gf_isom_get_payt_count function in hint_track.c, which allows attackers to cause a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2021-40576 |
219,912 | gpac | ad18ece95fa064efc0995c4ab2c985f77fb166ec | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/ad18ece95fa064efc0995c4ab2c985f77fb166ec | fixed #1904 | 0 | u32 GetHintFormat(GF_TrackBox *trak)
{
GF_HintMediaHeaderBox *hmhd = (GF_HintMediaHeaderBox *)trak->Media->information->InfoHeader;
if (!hmhd || (hmhd->type != GF_ISOM_BOX_TYPE_HMHD))
return 0;
if (!hmhd || !hmhd->subType) {
GF_Box *a = (GF_Box *)gf_list_get(trak->Media->information->sampleTable->SampleDescri... | 240641657114030682383886931707833033482 | hint_track.c | 28976036322661795345788739460485147148 | CWE-476 | CVE-2021-40576 | The binary MP4Box in Gpac 1.0.1 has a null pointer dereference vulnerability in the gf_isom_get_payt_count function in hint_track.c, which allows attackers to cause a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2021-40576 |
195,019 | tensorflow | 6b5adc0877de832b2a7c189532dbbbc64622eeb6 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/6b5adc0877de832b2a7c189532dbbbc64622eeb6 | Prevent `CHECK`-fail when building reference tensor.
The tensor constructor does not allow reference dtypes, as these should not show up explicitly. However, when passed these invalid types instead of building an invalid object the constructor crashes via a `CHECK`-fail. We have a static builder that properly handles ... | 1 | Status ConstantFolding::EvaluateOneFoldable(const NodeDef& node,
std::vector<NodeDef>* outputs,
bool* result_too_large) {
TensorVector inputs;
TensorVector output_tensors;
auto inputs_cleanup = gtl::MakeCleanup([&inputs, &outp... | 33937240667530924395323323412961833143 | constant_folding.cc | 221573695858123615640237954647315751120 | CWE-617 | CVE-2022-23588 | Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that Grappler optimizer would attempt to build a tensor using a reference `dtype`. This would result in a crash due to a `CHECK`-fail in the `Tensor` constructor as reference types are... | https://nvd.nist.gov/vuln/detail/CVE-2022-23588 |
219,931 | tensorflow | 6b5adc0877de832b2a7c189532dbbbc64622eeb6 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/6b5adc0877de832b2a7c189532dbbbc64622eeb6 | Prevent `CHECK`-fail when building reference tensor.
The tensor constructor does not allow reference dtypes, as these should not show up explicitly. However, when passed these invalid types instead of building an invalid object the constructor crashes via a `CHECK`-fail. We have a static builder that properly handles ... | 0 | Status ConstantFolding::EvaluateOneFoldable(const NodeDef& node,
std::vector<NodeDef>* outputs,
bool* result_too_large) {
TensorVector inputs;
TensorVector output_tensors;
auto inputs_cleanup = gtl::MakeCleanup([&inputs, &outp... | 111779981092160670584101984885423453823 | constant_folding.cc | 271606694375277711450004865336349725435 | CWE-617 | CVE-2022-23588 | Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that Grappler optimizer would attempt to build a tensor using a reference `dtype`. This would result in a crash due to a `CHECK`-fail in the `Tensor` constructor as reference types are... | https://nvd.nist.gov/vuln/detail/CVE-2022-23588 |
195,022 | glewlwyd | 125281f1c0d4b6a8b49f7e55a757205a2ef01fbe | https://github.com/babelouest/glewlwyd | https://github.com/babelouest/glewlwyd/commit/125281f1c0d4b6a8b49f7e55a757205a2ef01fbe | Fix update session when auth fail | 1 | int callback_glewlwyd_user_auth (const struct _u_request * request, struct _u_response * response, void * user_data) {
struct config_elements * config = (struct config_elements *)user_data;
json_t * j_param = ulfius_get_json_body_request(request, NULL), * j_result = NULL;
const char * ip_source = get_ip_source(re... | 236114269060053642565806917047085397848 | webservice.c | 249878395356016662912854745569339968395 | CWE-287 | CVE-2021-45379 | Glewlwyd 2.0.0, fixed in 2.6.1 is affected by an incorrect access control vulnerability. One user can attempt to log in as another user without its password. | https://nvd.nist.gov/vuln/detail/CVE-2021-45379 |
219,947 | glewlwyd | 125281f1c0d4b6a8b49f7e55a757205a2ef01fbe | https://github.com/babelouest/glewlwyd | https://github.com/babelouest/glewlwyd/commit/125281f1c0d4b6a8b49f7e55a757205a2ef01fbe | Fix update session when auth fail | 0 | int callback_glewlwyd_user_auth (const struct _u_request * request, struct _u_response * response, void * user_data) {
struct config_elements * config = (struct config_elements *)user_data;
json_t * j_param = ulfius_get_json_body_request(request, NULL), * j_result = NULL;
const char * ip_source = get_ip_source(re... | 155113792370707223407331204609439430532 | webservice.c | 287798817606377336444620654835011177393 | CWE-287 | CVE-2021-45379 | Glewlwyd 2.0.0, fixed in 2.6.1 is affected by an incorrect access control vulnerability. One user can attempt to log in as another user without its password. | https://nvd.nist.gov/vuln/detail/CVE-2021-45379 |
195,023 | tensorflow | a68f68061e263a88321c104a6c911fe5598050a8 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/a68f68061e263a88321c104a6c911fe5598050a8 | Replace faulty overflow check with a builder for `TensorShape`.
Prevents an integer overflow that was not caught before.
PiperOrigin-RevId: 415381595
Change-Id: I76585ddedc912bd9f4a390aeafa8e2ced1a28863 | 1 | void Compute(OpKernelContext* context) override {
const Tensor* input_indices;
const Tensor* input_values;
const Tensor* input_shape;
SparseTensorsMap* map;
OP_REQUIRES_OK(context, context->input("sparse_indices", &input_indices));
OP_REQUIRES_OK(context, context->input("sparse_values", &inpu... | 160387063214720131730960354923232758630 | sparse_tensors_map_ops.cc | 224775123349374780251651202891389866533 | CWE-190 | CVE-2022-23568 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `AddManySparseToTensorsMap` is vulnerable to an integer overflow which results in a `CHECK`-fail when building new `TensorShape` objects (so, an assert failure based denial of service). We are missing some validation on the shapes of the inp... | https://nvd.nist.gov/vuln/detail/CVE-2022-23568 |
220,021 | tensorflow | a68f68061e263a88321c104a6c911fe5598050a8 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/a68f68061e263a88321c104a6c911fe5598050a8 | Replace faulty overflow check with a builder for `TensorShape`.
Prevents an integer overflow that was not caught before.
PiperOrigin-RevId: 415381595
Change-Id: I76585ddedc912bd9f4a390aeafa8e2ced1a28863 | 0 | void Compute(OpKernelContext* context) override {
const Tensor* input_indices;
const Tensor* input_values;
const Tensor* input_shape;
SparseTensorsMap* map;
OP_REQUIRES_OK(context, context->input("sparse_indices", &input_indices));
OP_REQUIRES_OK(context, context->input("sparse_values", &inpu... | 294930600730557371611113946400120075396 | sparse_tensors_map_ops.cc | 5591389034837291700501932002893322459 | CWE-190 | CVE-2022-23568 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `AddManySparseToTensorsMap` is vulnerable to an integer overflow which results in a `CHECK`-fail when building new `TensorShape` objects (so, an assert failure based denial of service). We are missing some validation on the shapes of the inp... | https://nvd.nist.gov/vuln/detail/CVE-2022-23568 |
195,026 | linux | ab0fc21bc7105b54bafd85bd8b82742f9e68898a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ab0fc21bc7105b54bafd85bd8b82742f9e68898a | Revert "NFSv4: Handle the special Linux file open access mode"
This reverts commit 44942b4e457beda00981f616402a1a791e8c616e.
After secondly opening a file with O_ACCMODE|O_DIRECT flags,
nfs4_valid_open_stateid() will dereference NULL nfs4_state when lseek().
Reproducer:
1. mount -t nfs -o vers=4.2 $server_ip:/ /mn... | 1 | nfs4_file_open(struct inode *inode, struct file *filp)
{
struct nfs_open_context *ctx;
struct dentry *dentry = file_dentry(filp);
struct dentry *parent = NULL;
struct inode *dir;
unsigned openflags = filp->f_flags;
struct iattr attr;
int err;
/*
* If no cached dentry exists or if it's negative, NFSv4 handled... | 67846125552854891508125900978071958871 | nfs4file.c | 109456154040292488452120321326967957719 | CWE-909 | CVE-2022-24448 | An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descripto... | https://nvd.nist.gov/vuln/detail/CVE-2022-24448 |
220,100 | linux | ab0fc21bc7105b54bafd85bd8b82742f9e68898a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ab0fc21bc7105b54bafd85bd8b82742f9e68898a | Revert "NFSv4: Handle the special Linux file open access mode"
This reverts commit 44942b4e457beda00981f616402a1a791e8c616e.
After secondly opening a file with O_ACCMODE|O_DIRECT flags,
nfs4_valid_open_stateid() will dereference NULL nfs4_state when lseek().
Reproducer:
1. mount -t nfs -o vers=4.2 $server_ip:/ /mn... | 0 | nfs4_file_open(struct inode *inode, struct file *filp)
{
struct nfs_open_context *ctx;
struct dentry *dentry = file_dentry(filp);
struct dentry *parent = NULL;
struct inode *dir;
unsigned openflags = filp->f_flags;
struct iattr attr;
int err;
/*
* If no cached dentry exists or if it's negative, NFSv4 handled... | 272987829557105540879962051296017178836 | nfs4file.c | 19160442996144037090827134285929888626 | CWE-909 | CVE-2022-24448 | An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descripto... | https://nvd.nist.gov/vuln/detail/CVE-2022-24448 |
195,028 | tensorflow | ab51e5b813573dc9f51efa335aebcf2994125ee9 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/ab51e5b813573dc9f51efa335aebcf2994125ee9 | Prevent memory leak in decoding PNG images.
PiperOrigin-RevId: 409300653
Change-Id: I6182124c545989cef80cefd439b659095920763b | 1 | void DecodePngV2(OpKernelContext* context, StringPiece input) {
int channel_bits = (data_type_ == DataType::DT_UINT8) ? 8 : 16;
png::DecodeContext decode;
OP_REQUIRES(
context, png::CommonInitDecode(input, channels_, channel_bits, &decode),
errors::InvalidArgument("Invalid PNG. Failed to i... | 67814436772398534036630434647873886403 | decode_image_op.cc | 283519422605879710361255065504339887165 | CWE-401 | CVE-2022-23585 | Tensorflow is an Open Source Machine Learning Framework. When decoding PNG images TensorFlow can produce a memory leak if the image is invalid. After calling `png::CommonInitDecode(..., &decode)`, the `decode` value contains allocated buffers which can only be freed by calling `png::CommonFreeDecode(&decode)`. However,... | https://nvd.nist.gov/vuln/detail/CVE-2022-23585 |
220,168 | tensorflow | ab51e5b813573dc9f51efa335aebcf2994125ee9 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/ab51e5b813573dc9f51efa335aebcf2994125ee9 | Prevent memory leak in decoding PNG images.
PiperOrigin-RevId: 409300653
Change-Id: I6182124c545989cef80cefd439b659095920763b | 0 | void DecodePngV2(OpKernelContext* context, StringPiece input) {
int channel_bits = (data_type_ == DataType::DT_UINT8) ? 8 : 16;
png::DecodeContext decode;
OP_REQUIRES(
context, png::CommonInitDecode(input, channels_, channel_bits, &decode),
errors::InvalidArgument("Invalid PNG. Failed to i... | 183944225263640230240348550837981668390 | decode_image_op.cc | 140340118421060830961361158847913918052 | CWE-401 | CVE-2022-23585 | Tensorflow is an Open Source Machine Learning Framework. When decoding PNG images TensorFlow can produce a memory leak if the image is invalid. After calling `png::CommonInitDecode(..., &decode)`, the `decode` value contains allocated buffers which can only be freed by calling `png::CommonFreeDecode(&decode)`. However,... | https://nvd.nist.gov/vuln/detail/CVE-2022-23585 |
195,029 | tensorflow | c99d98cd189839dcf51aee94e7437b54b31f8abd | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd | Handle invalid inputs instead of crashing.
PiperOrigin-RevId: 409549744
Change-Id: I7f5935b34b53f7e426a5462fcc027bdbf5dcda24 | 1 | void Node::RunForwardTypeInference() {
VLOG(4) << "Forward type inference: " << props_->node_def.DebugString();
if (props_->fwd_type_fn == nullptr) {
return;
}
std::vector<Node*> input_nodes(props_->input_types.size(), nullptr);
std::vector<int> input_idx(props_->input_types.size(), 0);
for (const aut... | 285691869172413131662679092330979772991 | graph.cc | 172099243927919341591512227523808328051 | CWE-125 | CVE-2022-23592 | Tensorflow is an Open Source Machine Learning Framework. TensorFlow's type inference can cause a heap out of bounds read as the bounds checking is done in a `DCHECK` (which is a no-op during production). An attacker can control the `input_idx` variable such that `ix` would be larger than the number of values in `node_t... | https://nvd.nist.gov/vuln/detail/CVE-2022-23592 |
220,201 | tensorflow | c99d98cd189839dcf51aee94e7437b54b31f8abd | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd | Handle invalid inputs instead of crashing.
PiperOrigin-RevId: 409549744
Change-Id: I7f5935b34b53f7e426a5462fcc027bdbf5dcda24 | 0 | void Node::RunForwardTypeInference() {
VLOG(4) << "Forward type inference: " << props_->node_def.DebugString();
if (props_->fwd_type_fn == nullptr) {
return;
}
std::vector<Node*> input_nodes(props_->input_types.size(), nullptr);
std::vector<int> input_idx(props_->input_types.size(), 0);
for (const aut... | 208747443072046126472677622190312892089 | graph.cc | 252683577168046425270820661985512954953 | CWE-125 | CVE-2022-23592 | Tensorflow is an Open Source Machine Learning Framework. TensorFlow's type inference can cause a heap out of bounds read as the bounds checking is done in a `DCHECK` (which is a no-op during production). An attacker can control the `input_idx` variable such that `ix` would be larger than the number of values in `node_t... | https://nvd.nist.gov/vuln/detail/CVE-2022-23592 |
195,038 | mruby | 27d1e0132a0804581dca28df042e7047fd27eaa8 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/27d1e0132a0804581dca28df042e7047fd27eaa8 | array.c: fix `mrb_ary_shift_m` initialization bug.
The `ARY_PTR` and `ARY_LEN` may be modified in `mrb_get_args`. | 1 | mrb_ary_shift_m(mrb_state *mrb, mrb_value self)
{
struct RArray *a = mrb_ary_ptr(self);
mrb_int len = ARY_LEN(a);
mrb_int n;
mrb_value val;
if (mrb_get_args(mrb, "|i", &n) == 0) {
return mrb_ary_shift(mrb, self);
};
ary_modify_check(mrb, a);
if (len == 0 || n == 0) return mrb_ary_new(mrb);
if (n ... | 88987793594626442814152795226896894437 | array.c | 131985777969528154957566525214352537878 | CWE-476 | CVE-2021-4188 | mruby is vulnerable to NULL Pointer Dereference | https://nvd.nist.gov/vuln/detail/CVE-2021-4188 |
220,442 | mruby | 27d1e0132a0804581dca28df042e7047fd27eaa8 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/27d1e0132a0804581dca28df042e7047fd27eaa8 | array.c: fix `mrb_ary_shift_m` initialization bug.
The `ARY_PTR` and `ARY_LEN` may be modified in `mrb_get_args`. | 0 | mrb_ary_shift_m(mrb_state *mrb, mrb_value self)
{
mrb_int n;
if (mrb_get_args(mrb, "|i", &n) == 0) {
return mrb_ary_shift(mrb, self);
}
struct RArray *a = mrb_ary_ptr(self);
mrb_int len = ARY_LEN(a);
mrb_value val;
ary_modify_check(mrb, a);
if (len == 0 || n == 0) return mrb_ary_new(mrb);
if (n... | 336824346603495353101799104649854425750 | array.c | 295526445825727607536544634773604768998 | CWE-476 | CVE-2021-4188 | mruby is vulnerable to NULL Pointer Dereference | https://nvd.nist.gov/vuln/detail/CVE-2021-4188 |
195,039 | tensorflow | e7f497570abb6b4ae5af4970620cd880e4c0c904 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/e7f497570abb6b4ae5af4970620cd880e4c0c904 | Fix segfault on OOM in Conv2D.
PiperOrigin-RevId: 404655317
Change-Id: I33588dbd3f5d0fef980e3c908bf5515a9ee09ce7 | 1 | void operator()(OpKernelContext* ctx, const Tensor& input,
const Tensor& filter, int row_stride, int col_stride,
int row_dilation, int col_dilation, const Padding& padding,
const std::vector<int64_t>& explicit_paddings, Tensor* output,
TensorForm... | 257618220779157714024325768166416151732 | conv_ops.cc | 252300068611383622428481854806618645318 | CWE-354 | CVE-2021-41206 | TensorFlow is an open source platform for machine learning. In affected versions several TensorFlow operations are missing validation for the shapes of the tensor arguments involved in the call. Depending on the API, this can result in undefined behavior and segfault or `CHECK`-fail related crashes but in some scenario... | https://nvd.nist.gov/vuln/detail/CVE-2021-41206 |
220,449 | tensorflow | e7f497570abb6b4ae5af4970620cd880e4c0c904 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/e7f497570abb6b4ae5af4970620cd880e4c0c904 | Fix segfault on OOM in Conv2D.
PiperOrigin-RevId: 404655317
Change-Id: I33588dbd3f5d0fef980e3c908bf5515a9ee09ce7 | 0 | void operator()(OpKernelContext* ctx, const Tensor& input,
const Tensor& filter, int row_stride, int col_stride,
int row_dilation, int col_dilation, const Padding& padding,
const std::vector<int64_t>& explicit_paddings, Tensor* output,
TensorForm... | 52476148530312265483336987277784785500 | conv_ops.cc | 162425470101834995272420301327894414264 | CWE-354 | CVE-2021-41206 | TensorFlow is an open source platform for machine learning. In affected versions several TensorFlow operations are missing validation for the shapes of the tensor arguments involved in the call. Depending on the API, this can result in undefined behavior and segfault or `CHECK`-fail related crashes but in some scenario... | https://nvd.nist.gov/vuln/detail/CVE-2021-41206 |
195,040 | tensorflow | e21af685e1828f7ca65038307df5cc06de4479e8 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/e21af685e1828f7ca65038307df5cc06de4479e8 | Fix Null-pointer dereference in BuildXlaCompilationCache
If ConfigProto is not used, then use the default settings which is to allow all devices.
PiperOrigin-RevId: 420391800
Change-Id: I88161ad7042990aef678e77b597a2fb2c8f815be | 1 | Status BuildXlaCompilationCache(DeviceBase* device, FunctionLibraryRuntime* flr,
const XlaPlatformInfo& platform_info,
XlaCompilationCache** cache) {
if (platform_info.xla_device_metadata()) {
*cache = new XlaCompilationCache(
platform_info.x... | 179065639871904945359341382009364285020 | xla_platform_info.cc | 171804916137745205288117058026592469555 | CWE-476 | CVE-2022-23595 | Tensorflow is an Open Source Machine Learning Framework. When building an XLA compilation cache, if default settings are used, TensorFlow triggers a null pointer dereference. In the default scenario, all devices are allowed, so `flr->config_proto` is `nullptr`. The fix will be included in TensorFlow 2.8.0. We will also... | https://nvd.nist.gov/vuln/detail/CVE-2022-23595 |
220,463 | tensorflow | e21af685e1828f7ca65038307df5cc06de4479e8 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/e21af685e1828f7ca65038307df5cc06de4479e8 | Fix Null-pointer dereference in BuildXlaCompilationCache
If ConfigProto is not used, then use the default settings which is to allow all devices.
PiperOrigin-RevId: 420391800
Change-Id: I88161ad7042990aef678e77b597a2fb2c8f815be | 0 | Status BuildXlaCompilationCache(DeviceBase* device, FunctionLibraryRuntime* flr,
const XlaPlatformInfo& platform_info,
XlaCompilationCache** cache) {
if (platform_info.xla_device_metadata()) {
*cache = new XlaCompilationCache(
platform_info.x... | 150487232572114145456611052017035566512 | xla_platform_info.cc | 318276067980065095571736754899104138947 | CWE-476 | CVE-2022-23595 | Tensorflow is an Open Source Machine Learning Framework. When building an XLA compilation cache, if default settings are used, TensorFlow triggers a null pointer dereference. In the default scenario, all devices are allowed, so `flr->config_proto` is `nullptr`. The fix will be included in TensorFlow 2.8.0. We will also... | https://nvd.nist.gov/vuln/detail/CVE-2022-23595 |
195,055 | tensorflow | 2b7100d6cdff36aa21010a82269bc05a6d1cc74a | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/2b7100d6cdff36aa21010a82269bc05a6d1cc74a | Cleanup and remove duplicate validation in `SparseCount`.
We have valdiation that is duplicated, checking different conditions, in different formats and failing to capture all cases. This should fix all the previous bugs.
PiperOrigin-RevId: 414886981
Change-Id: Ibf0bba0beb057b76d505324bb9487565daf95f01 | 1 | void Compute(OpKernelContext* context) override {
const Tensor& indices = context->input(0);
const Tensor& values = context->input(1);
const Tensor& shape = context->input(2);
const Tensor& weights = context->input(3);
bool use_weights = weights.NumElements() > 0;
OP_REQUIRES(context, TensorS... | 115744370413617881150207979427400512016 | count_ops.cc | 290832582717285970119064032382621433475 | CWE-787 | CVE-2022-21740 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCountSparseOutput` is vulnerable to a heap overflow. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still i... | https://nvd.nist.gov/vuln/detail/CVE-2022-21740 |
220,804 | tensorflow | 2b7100d6cdff36aa21010a82269bc05a6d1cc74a | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/2b7100d6cdff36aa21010a82269bc05a6d1cc74a | Cleanup and remove duplicate validation in `SparseCount`.
We have valdiation that is duplicated, checking different conditions, in different formats and failing to capture all cases. This should fix all the previous bugs.
PiperOrigin-RevId: 414886981
Change-Id: Ibf0bba0beb057b76d505324bb9487565daf95f01 | 0 | void Compute(OpKernelContext* context) override {
const Tensor& splits = context->input(0);
const Tensor& values = context->input(1);
const Tensor& weights = context->input(2);
bool use_weights = weights.NumElements() > 0;
bool is_1d = false;
if (use_weights) {
OP_REQUIRES(
co... | 321329284400462468105618833406255634390 | count_ops.cc | 221778566959720819887290009238961995785 | CWE-787 | CVE-2022-21740 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCountSparseOutput` is vulnerable to a heap overflow. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still i... | https://nvd.nist.gov/vuln/detail/CVE-2022-21740 |
195,056 | tensorflow | 8c6f391a2282684a25cbfec7687bd5d35261a209 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/8c6f391a2282684a25cbfec7687bd5d35261a209 | [lite] Add check for bias_size is zero to avoid division by zero. This shouldn't happen for properly converted models. Just safety check
PiperOrigin-RevId: 416383645
Change-Id: If8e508bf696ae8ecfb927e69c139a8ccf7fe60cb | 1 | inline void BiasAndClamp(float clamp_min, float clamp_max, int bias_size,
const float* bias_data, int array_size,
float* array_data) {
// Note: see b/132215220: in May 2019 we thought it would be OK to replace
// this with the Eigen one-liner:
// return (array.c... | 154263320578941255259441922880599149557 | common.h | 11373796702176609664888229687660280569 | CWE-369 | CVE-2022-23557 | Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would trigger a division by zero in `BiasAndClamp` implementation. There is no check that the `bias_size` is non zero. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1,... | https://nvd.nist.gov/vuln/detail/CVE-2022-23557 |
220,841 | tensorflow | 8c6f391a2282684a25cbfec7687bd5d35261a209 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/8c6f391a2282684a25cbfec7687bd5d35261a209 | [lite] Add check for bias_size is zero to avoid division by zero. This shouldn't happen for properly converted models. Just safety check
PiperOrigin-RevId: 416383645
Change-Id: If8e508bf696ae8ecfb927e69c139a8ccf7fe60cb | 0 | inline void BiasAndClamp(float clamp_min, float clamp_max, int bias_size,
const float* bias_data, int array_size,
float* array_data) {
if (bias_size == 0) return;
// Note: see b/132215220: in May 2019 we thought it would be OK to replace
// this with the Eigen one... | 163406073569204971648641083480315438791 | common.h | 206010119069068373550820723284960883967 | CWE-369 | CVE-2022-23557 | Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would trigger a division by zero in `BiasAndClamp` implementation. There is no check that the `bias_size` is non zero. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1,... | https://nvd.nist.gov/vuln/detail/CVE-2022-23557 |
195,059 | tensorflow | 92dba16749fae36c246bec3f9ba474d9ddeb7662 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/92dba16749fae36c246bec3f9ba474d9ddeb7662 | Prevent a null-pointer dereference / `CHECK`-fail in grappler.
PiperOrigin-RevId: 409187354
Change-Id: I369c249cca32e6c56ec193f0ebbf2f2768fc7d43 | 1 | bool DependencyOptimizer::SafeToRemoveIdentity(const NodeDef& node) const {
if (!IsIdentity(node) && !IsIdentityN(node)) {
return true;
}
if (nodes_to_preserve_.find(node.name()) != nodes_to_preserve_.end()) {
return false;
}
if (!fetch_nodes_known_) {
// The output values of this node may be nee... | 61147310262209694276783937154772465535 | dependency_optimizer.cc | 98916752340112642333125918775752240620 | CWE-617 | CVE-2022-23579 | Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that `SafeToRemoveIdentity` would trigger `CHECK` failures. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFl... | https://nvd.nist.gov/vuln/detail/CVE-2022-23579 |
220,909 | tensorflow | 92dba16749fae36c246bec3f9ba474d9ddeb7662 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/92dba16749fae36c246bec3f9ba474d9ddeb7662 | Prevent a null-pointer dereference / `CHECK`-fail in grappler.
PiperOrigin-RevId: 409187354
Change-Id: I369c249cca32e6c56ec193f0ebbf2f2768fc7d43 | 0 | bool DependencyOptimizer::SafeToRemoveIdentity(const NodeDef& node) const {
if (!IsIdentity(node) && !IsIdentityN(node)) {
return true;
}
if (nodes_to_preserve_.find(node.name()) != nodes_to_preserve_.end()) {
return false;
}
if (!fetch_nodes_known_) {
// The output values of this node may be nee... | 223351651745564626611627672045490996261 | None | CWE-617 | CVE-2022-23579 | Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that `SafeToRemoveIdentity` would trigger `CHECK` failures. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFl... | https://nvd.nist.gov/vuln/detail/CVE-2022-23579 | |
195,063 | gpac | 5f2c2a16d30229b6241f02fa28e3d6b810d64858 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/5f2c2a16d30229b6241f02fa28e3d6b810d64858 | fixed #1905 | 1 | GF_Err mpgviddmx_process(GF_Filter *filter)
{
GF_MPGVidDmxCtx *ctx = gf_filter_get_udta(filter);
GF_FilterPacket *pck, *dst_pck;
u64 byte_offset;
s64 vosh_start = -1;
s64 vosh_end = -1;
GF_Err e;
char *data;
u8 *start;
u32 pck_size;
s32 remain;
//always reparse duration
if (!ctx->duration.num)
mpgviddmx_... | 49630978088913986571244550780083545600 | reframe_mpgvid.c | 148306570807841160156662867455353144265 | CWE-476 | CVE-2021-40575 | The binary MP4Box in Gpac 1.0.1 has a null pointer dereference vulnerability in the mpgviddmx_process function in reframe_mpgvid.c, which allows attackers to cause a denial of service. This vulnerability is possibly due to an incomplete fix for CVE-2021-40566. | https://nvd.nist.gov/vuln/detail/CVE-2021-40575 |
220,924 | gpac | 5f2c2a16d30229b6241f02fa28e3d6b810d64858 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/5f2c2a16d30229b6241f02fa28e3d6b810d64858 | fixed #1905 | 0 | GF_Err mpgviddmx_process(GF_Filter *filter)
{
GF_MPGVidDmxCtx *ctx = gf_filter_get_udta(filter);
GF_FilterPacket *pck, *dst_pck;
u64 byte_offset;
s64 vosh_start = -1;
s64 vosh_end = -1;
GF_Err e;
char *data;
u8 *start;
u32 pck_size;
s32 remain;
//always reparse duration
if (!ctx->duration.num)
mpgviddmx_... | 313423902312193703310274340114212883369 | None | CWE-476 | CVE-2021-40575 | The binary MP4Box in Gpac 1.0.1 has a null pointer dereference vulnerability in the mpgviddmx_process function in reframe_mpgvid.c, which allows attackers to cause a denial of service. This vulnerability is possibly due to an incomplete fix for CVE-2021-40566. | https://nvd.nist.gov/vuln/detail/CVE-2021-40575 | |
195,069 | gpac | f1ae01d745200a258cdf62622f71754c37cb6c30 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/f1ae01d745200a258cdf62622f71754c37cb6c30 | fixed #1900 | 1 | static s32 svc_parse_slice(GF_BitStream *bs, AVCState *avc, AVCSliceInfo *si)
{
s32 pps_id;
/*s->current_picture.reference= h->nal_ref_idc != 0;*/
gf_bs_read_ue_log(bs, "first_mb_in_slice");
si->slice_type = gf_bs_read_ue_log(bs, "slice_type");
if (si->slice_type > 9) return -1;
pps_id = gf_bs_read_ue_log(bs, "... | 32918828304584753556059241288811637938 | av_parsers.c | 168517587328341017594269375399465893964 | CWE-120 | CVE-2021-40568 | A buffer overflow vulnerability exists in Gpac through 1.0.1 via a malformed MP4 file in the svc_parse_slice function in av_parsers.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges. | https://nvd.nist.gov/vuln/detail/CVE-2021-40568 |
221,079 | gpac | f1ae01d745200a258cdf62622f71754c37cb6c30 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/f1ae01d745200a258cdf62622f71754c37cb6c30 | fixed #1900 | 0 | static s32 svc_parse_slice(GF_BitStream *bs, AVCState *avc, AVCSliceInfo *si)
{
s32 pps_id;
/*s->current_picture.reference= h->nal_ref_idc != 0;*/
gf_bs_read_ue_log(bs, "first_mb_in_slice");
si->slice_type = gf_bs_read_ue_log(bs, "slice_type");
if (si->slice_type > 9) return -1;
pps_id = gf_bs_read_ue_log(bs, "... | 185903137648833315964702797768717766367 | av_parsers.c | 336095072032702615903888752582747164805 | CWE-120 | CVE-2021-40568 | A buffer overflow vulnerability exists in Gpac through 1.0.1 via a malformed MP4 file in the svc_parse_slice function in av_parsers.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges. | https://nvd.nist.gov/vuln/detail/CVE-2021-40568 |
195,073 | tensorflow | e746adbfcfee15e9cfdb391ff746c765b99bdf9b | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b | Prevent use after free in `DecodePng` kernel.
We are cleaning up the memory in `decode` and then we are using an `OP_REQUIRES` to check an invariant on the `decode` data.
PiperOrigin-RevId: 409299145
Change-Id: I4eb93aaca52483eb202e89b78df07fbb2f6cb254 | 1 | void DecodePngV2(OpKernelContext* context, StringPiece input) {
int channel_bits = (data_type_ == DataType::DT_UINT8) ? 8 : 16;
png::DecodeContext decode;
OP_REQUIRES(
context, png::CommonInitDecode(input, channels_, channel_bits, &decode),
errors::InvalidArgument("Invalid PNG. Failed to i... | 20785520030401878119367159260444796492 | decode_image_op.cc | 250237771010213788823348212493793467085 | CWE-416 | CVE-2022-23584 | Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a use after free behavior when decoding PNG images. After `png::CommonFreeDecode(&decode)` gets called, the values of `decode.width` and `decode.height` are in an unspecified state. The fix will be included in TensorFlow 2.8.0. We will ... | https://nvd.nist.gov/vuln/detail/CVE-2022-23584 |
221,123 | tensorflow | e746adbfcfee15e9cfdb391ff746c765b99bdf9b | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b | Prevent use after free in `DecodePng` kernel.
We are cleaning up the memory in `decode` and then we are using an `OP_REQUIRES` to check an invariant on the `decode` data.
PiperOrigin-RevId: 409299145
Change-Id: I4eb93aaca52483eb202e89b78df07fbb2f6cb254 | 0 | void DecodePngV2(OpKernelContext* context, StringPiece input) {
int channel_bits = (data_type_ == DataType::DT_UINT8) ? 8 : 16;
png::DecodeContext decode;
OP_REQUIRES(
context, png::CommonInitDecode(input, channels_, channel_bits, &decode),
errors::InvalidArgument("Invalid PNG. Failed to i... | 197194550974667972193999280383190029027 | decode_image_op.cc | 250371192243587827698671199962137663449 | CWE-416 | CVE-2022-23584 | Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a use after free behavior when decoding PNG images. After `png::CommonFreeDecode(&decode)` gets called, the values of `decode.width` and `decode.height` are in an unspecified state. The fix will be included in TensorFlow 2.8.0. We will ... | https://nvd.nist.gov/vuln/detail/CVE-2022-23584 |
195,074 | gpac | a69b567b8c95c72f9560c873c5ab348be058f340 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/a69b567b8c95c72f9560c873c5ab348be058f340 | fixed #1895 | 1 | GF_AV1Config *gf_odf_av1_cfg_read_bs_size(GF_BitStream *bs, u32 size)
{
#ifndef GPAC_DISABLE_AV_PARSERS
AV1State state;
u8 reserved;
GF_AV1Config *cfg;
if (!size) size = (u32) gf_bs_available(bs);
if (!size) return NULL;
cfg = gf_odf_av1_cfg_new();
gf_av1_init_state(&state);
state.config = cfg;
cfg->marker ... | 270972574846681061752900592460657064315 | descriptors.c | 100253523943266503998746709370742625478 | CWE-415 | CVE-2021-40571 | The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the ilst_box_read function in box_code_apple.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges. | https://nvd.nist.gov/vuln/detail/CVE-2021-40571 |
221,160 | gpac | a69b567b8c95c72f9560c873c5ab348be058f340 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/a69b567b8c95c72f9560c873c5ab348be058f340 | fixed #1895 | 0 | GF_AV1Config *gf_odf_av1_cfg_read_bs_size(GF_BitStream *bs, u32 size)
{
#ifndef GPAC_DISABLE_AV_PARSERS
AV1State state;
u8 reserved;
GF_AV1Config *cfg;
if (!size) size = (u32) gf_bs_available(bs);
if (!size) return NULL;
cfg = gf_odf_av1_cfg_new();
gf_av1_init_state(&state);
state.config = cfg;
cfg->marker ... | 161782515383812350901831460771265303089 | descriptors.c | 86476492964393375980272696403064975409 | CWE-415 | CVE-2021-40571 | The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the ilst_box_read function in box_code_apple.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges. | https://nvd.nist.gov/vuln/detail/CVE-2021-40571 |
195,082 | linux | c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc | KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)
If L1 disables VMLOAD/VMSAVE intercepts, and doesn't enable
Virtual VMLOAD/VMSAVE (currently not supported for the nested hypervisor),
then VMLOAD/VMSAVE must operate on the L1 physical memory, which is only
possible by making L0 intercept these ins... | 1 | void recalc_intercepts(struct vcpu_svm *svm)
{
struct vmcb_control_area *c, *h, *g;
unsigned int i;
vmcb_mark_dirty(svm->vmcb, VMCB_INTERCEPTS);
if (!is_guest_mode(&svm->vcpu))
return;
c = &svm->vmcb->control;
h = &svm->vmcb01.ptr->control;
g = &svm->nested.ctl;
for (i = 0; i < MAX_INTERCEPT; i++)
c->in... | 308018010909685377463219146239861290533 | None | CWE-862 | CVE-2021-3656 | A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable bot... | https://nvd.nist.gov/vuln/detail/CVE-2021-3656 | |
221,413 | linux | c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc | KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)
If L1 disables VMLOAD/VMSAVE intercepts, and doesn't enable
Virtual VMLOAD/VMSAVE (currently not supported for the nested hypervisor),
then VMLOAD/VMSAVE must operate on the L1 physical memory, which is only
possible by making L0 intercept these ins... | 0 | void recalc_intercepts(struct vcpu_svm *svm)
{
struct vmcb_control_area *c, *h, *g;
unsigned int i;
vmcb_mark_dirty(svm->vmcb, VMCB_INTERCEPTS);
if (!is_guest_mode(&svm->vcpu))
return;
c = &svm->vmcb->control;
h = &svm->vmcb01.ptr->control;
g = &svm->nested.ctl;
for (i = 0; i < MAX_INTERCEPT; i++)
c->in... | 61346983903340748153155985789359366401 | None | CWE-862 | CVE-2021-3656 | A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable bot... | https://nvd.nist.gov/vuln/detail/CVE-2021-3656 | |
195,083 | tensorflow | 5b491cd5e41ad63735161cec9c2a568172c8b6a3 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/5b491cd5e41ad63735161cec9c2a568172c8b6a3 | Validate `proto.dtype()` before calling `set_dtype()`.
This prevents a `DCHECK`-fail when the proto contains an invalid dtype for a tensor shape with 0 elements or for an incomplete tensor shape.
PiperOrigin-RevId: 408369083
Change-Id: Ia21a3e3d62a90d642a4561f08f3b543e5ad00c46 | 1 | bool Tensor::FromProto(Allocator* a, const TensorProto& proto) {
CHECK_NOTNULL(a);
TensorBuffer* p = nullptr;
if (!TensorShape::IsValid(proto.tensor_shape())) return false;
if (proto.dtype() == DT_INVALID) return false;
TensorShape shape(proto.tensor_shape());
const int64_t N = shape.num_elements();
if (N... | 112719252128622113589892906952570683457 | tensor.cc | 289613009517546867193769314060658742037 | CWE-617 | CVE-2022-23571 | Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments, if the tensors have an invalid `dtype` and 0 elements or an invalid shape. This allows attackers to cause d... | https://nvd.nist.gov/vuln/detail/CVE-2022-23571 |
221,428 | tensorflow | 5b491cd5e41ad63735161cec9c2a568172c8b6a3 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/5b491cd5e41ad63735161cec9c2a568172c8b6a3 | Validate `proto.dtype()` before calling `set_dtype()`.
This prevents a `DCHECK`-fail when the proto contains an invalid dtype for a tensor shape with 0 elements or for an incomplete tensor shape.
PiperOrigin-RevId: 408369083
Change-Id: Ia21a3e3d62a90d642a4561f08f3b543e5ad00c46 | 0 | bool Tensor::FromProto(Allocator* a, const TensorProto& proto) {
CHECK_NOTNULL(a);
TensorBuffer* p = nullptr;
if (!TensorShape::IsValid(proto.tensor_shape())) return false;
if (proto.dtype() == DT_INVALID) return false;
TensorShape shape(proto.tensor_shape());
const int64_t N = shape.num_elements();
if (N... | 12020279702191708342972381802829194549 | tensor.cc | 303884711858139014412460575672580480868 | CWE-617 | CVE-2022-23571 | Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments, if the tensors have an invalid `dtype` and 0 elements or an invalid shape. This allows attackers to cause d... | https://nvd.nist.gov/vuln/detail/CVE-2022-23571 |
195,091 | tensorflow | 35f0fabb4c178253a964d7aabdbb15c6a398b69a | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/35f0fabb4c178253a964d7aabdbb15c6a398b69a | Avoid Segfault for scalar shapes.
Calling tensor::FromElementsOp with an empty vector of elements and no type
causes a segfault. We need to let the FromElementsOp know which scalar type it
should have.
Also add back the DynamicBroadcastInDimOp canonicalization patterns, which
previously prevented this bug from happeni... | 1 | llvm::Optional<Value> simplifyBroadcast(ShapeComponentAnalysis& analysis,
ValueRange shapes, Location loc,
OpBuilder* builder) {
// First find the input shape with the largest rank.
SmallVector<ArrayRef<ShapeComponentAnalysis::SymbolicE... | 84683486121098934971147990908524528886 | tf_cpurt_symbolic_shape_optimization.cc | 183860206963562900623001205261417288221 | CWE-754 | CVE-2022-23593 | Tensorflow is an Open Source Machine Learning Framework. The `simplifyBroadcast` function in the MLIR-TFRT infrastructure in TensorFlow is vulnerable to a segfault (hence, denial of service), if called with scalar shapes. If all shapes are scalar, then `maxRank` is 0, so we build an empty `SmallVector`. The fix will be... | https://nvd.nist.gov/vuln/detail/CVE-2022-23593 |
221,631 | tensorflow | 35f0fabb4c178253a964d7aabdbb15c6a398b69a | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/35f0fabb4c178253a964d7aabdbb15c6a398b69a | Avoid Segfault for scalar shapes.
Calling tensor::FromElementsOp with an empty vector of elements and no type
causes a segfault. We need to let the FromElementsOp know which scalar type it
should have.
Also add back the DynamicBroadcastInDimOp canonicalization patterns, which
previously prevented this bug from happeni... | 0 | llvm::Optional<Value> simplifyBroadcast(ShapeComponentAnalysis& analysis,
ValueRange shapes, Location loc,
OpBuilder* builder) {
// First find the input shape with the largest rank.
SmallVector<ArrayRef<ShapeComponentAnalysis::SymbolicE... | 131837408517580503230068988683463768929 | tf_cpurt_symbolic_shape_optimization.cc | 61127670286277963749447708912499557476 | CWE-754 | CVE-2022-23593 | Tensorflow is an Open Source Machine Learning Framework. The `simplifyBroadcast` function in the MLIR-TFRT infrastructure in TensorFlow is vulnerable to a segfault (hence, denial of service), if called with scalar shapes. If all shapes are scalar, then `maxRank` is 0, so we build an empty `SmallVector`. The fix will be... | https://nvd.nist.gov/vuln/detail/CVE-2022-23593 |
195,092 | hermes | 55e1b2343f4deb1a1b5726cfe1e23b2068217ff2 | https://github.com/facebook/hermes | https://github.com/facebook/hermes/commit/55e1b2343f4deb1a1b5726cfe1e23b2068217ff2 | Handle typeof applied to empty in InstSimplify
Summary:
Do not simplify `typeof` if it is applied to an invalid type. This
handles a case like the one in the added test, where `typeof` is called
on a literal empty in unreachable code.
Reviewed By: kodafb
Differential Revision: D31000173
fbshipit-source-id: 2d7f69cb... | 1 | Literal *hermes::evalUnaryOperator(
UnaryOperatorInst::OpKind kind,
IRBuilder &builder,
Literal *operand) {
switch (kind) {
case UnaryOperatorInst::OpKind::MinusKind:
// Negate constant integers.
switch (operand->getKind()) {
case ValueKind::LiteralNumberKind:
if (auto *l... | 318397569222892175642900890058916302083 | IREval.cpp | 25640608993938735880507555687030796129 | CWE-843 | CVE-2021-24045 | A type confusion vulnerability could be triggered when resolving the "typeof" unary operator in Facebook Hermes prior to v0.10.0. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected. | https://nvd.nist.gov/vuln/detail/CVE-2021-24045 |
221,651 | hermes | 55e1b2343f4deb1a1b5726cfe1e23b2068217ff2 | https://github.com/facebook/hermes | https://github.com/facebook/hermes/commit/55e1b2343f4deb1a1b5726cfe1e23b2068217ff2 | Handle typeof applied to empty in InstSimplify
Summary:
Do not simplify `typeof` if it is applied to an invalid type. This
handles a case like the one in the added test, where `typeof` is called
on a literal empty in unreachable code.
Reviewed By: kodafb
Differential Revision: D31000173
fbshipit-source-id: 2d7f69cb... | 0 | Literal *hermes::evalUnaryOperator(
UnaryOperatorInst::OpKind kind,
IRBuilder &builder,
Literal *operand) {
switch (kind) {
case UnaryOperatorInst::OpKind::MinusKind:
// Negate constant integers.
switch (operand->getKind()) {
case ValueKind::LiteralNumberKind:
if (auto *l... | 123137692006195986808828639392289766950 | IREval.cpp | 42961914778696217563735135747458181955 | CWE-843 | CVE-2021-24045 | A type confusion vulnerability could be triggered when resolving the "typeof" unary operator in Facebook Hermes prior to v0.10.0. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected. | https://nvd.nist.gov/vuln/detail/CVE-2021-24045 |
195,095 | e2guardian | eae46a7e2a57103aadca903c4a24cca94dc502a2 | https://github.com/e2guardian/e2guardian | https://github.com/e2guardian/e2guardian/commit/eae46a7e2a57103aadca903c4a24cca94dc502a2 | Fix bug #707 cert hostnames not being checked
- only happened when openssl v1.1 is used | 1 | int Socket::startSslClient(const std::string &certificate_path, String hostname)
{
if (isssl) {
stopSsl();
}
ERR_clear_error();
#if OPENSSL_VERSION_NUMBER < 0x10100000L
ctx = SSL_CTX_new(SSLv23_client_method());
#else
ctx = SSL_CTX_new(TLS_client_method());
#endif
if (ctx == NULL) {
#i... | 285364534121786496260977042144971081331 | Socket.cpp | 283084154597152068392957992825637904487 | CWE-295 | CVE-2021-44273 | e2guardian v5.4.x <= v5.4.3r is affected by missing SSL certificate validation in the SSL MITM engine. In standalone mode (i.e., acting as a proxy or a transparent proxy), with SSL MITM enabled, e2guardian, if built with OpenSSL v1.1.x, did not validate hostnames in certificates of the web servers that it connected to,... | https://nvd.nist.gov/vuln/detail/CVE-2021-44273 |
221,678 | e2guardian | eae46a7e2a57103aadca903c4a24cca94dc502a2 | https://github.com/e2guardian/e2guardian | https://github.com/e2guardian/e2guardian/commit/eae46a7e2a57103aadca903c4a24cca94dc502a2 | Fix bug #707 cert hostnames not being checked
- only happened when openssl v1.1 is used | 0 | int Socket::startSslClient(const std::string &certificate_path, String hostname)
{
if (isssl) {
stopSsl();
}
ERR_clear_error();
#if OPENSSL_VERSION_NUMBER < 0x10100000L
ctx = SSL_CTX_new(SSLv23_client_method());
#else
ctx = SSL_CTX_new(TLS_client_method());
#endif
if (ctx == NULL) {
#i... | 137664252347139284732164058213112105028 | Socket.cpp | 316707147744091371767800459911917453562 | CWE-295 | CVE-2021-44273 | e2guardian v5.4.x <= v5.4.3r is affected by missing SSL certificate validation in the SSL MITM engine. In standalone mode (i.e., acting as a proxy or a transparent proxy), with SSL MITM enabled, e2guardian, if built with OpenSSL v1.1.x, did not validate hostnames in certificates of the web servers that it connected to,... | https://nvd.nist.gov/vuln/detail/CVE-2021-44273 |
195,220 | tmate-ssh-server | 1c020d1f5ca462f5b150b46a027aaa1bbe3c9596 | https://github.com/tmate-io/tmate-ssh-server | https://github.com/tmate-io/tmate-ssh-server/commit/1c020d1f5ca462f5b150b46a027aaa1bbe3c9596 | Harden /tmp/tmate directory
Suggested by Matthias Gerstner | 1 | int main(int argc, char **argv, char **envp)
{
int opt;
while ((opt = getopt(argc, argv, "b:h:k:p:q:w:z:xv")) != -1) {
switch (opt) {
case 'b':
tmate_settings->bind_addr = xstrdup(optarg);
break;
case 'h':
tmate_settings->tmate_host = xstrdup(optarg);
break;
case 'k':
tmate_settings->keys_dir ... | 154027151645284385944526585123822701001 | tmate-main.c | 280350825550794138629823084137678566150 | CWE-362 | CVE-2021-44512 | World-writable permissions on the /tmp/tmate/sessions directory in tmate-ssh-server 2.3.0 allow a local attacker to compromise the integrity of session handling, or obtain the read-write session ID from a read-only session symlink in this directory. | https://nvd.nist.gov/vuln/detail/CVE-2021-44512 |
222,666 | tmate-ssh-server | 1c020d1f5ca462f5b150b46a027aaa1bbe3c9596 | https://github.com/tmate-io/tmate-ssh-server | https://github.com/tmate-io/tmate-ssh-server/commit/1c020d1f5ca462f5b150b46a027aaa1bbe3c9596 | Harden /tmp/tmate directory
Suggested by Matthias Gerstner | 0 | int main(int argc, char **argv, char **envp)
{
int opt;
while ((opt = getopt(argc, argv, "b:h:k:p:q:w:z:xv")) != -1) {
switch (opt) {
case 'b':
tmate_settings->bind_addr = xstrdup(optarg);
break;
case 'h':
tmate_settings->tmate_host = xstrdup(optarg);
break;
case 'k':
tmate_settings->keys_dir ... | 271664953315961811306024013861867052587 | tmate-main.c | 90810006588409733709876992634170493502 | CWE-362 | CVE-2021-44512 | World-writable permissions on the /tmp/tmate/sessions directory in tmate-ssh-server 2.3.0 allow a local attacker to compromise the integrity of session handling, or obtain the read-write session ID from a read-only session symlink in this directory. | https://nvd.nist.gov/vuln/detail/CVE-2021-44512 |
195,230 | pjproject | f74c1fc22b760d2a24369aa72c74c4a9ab985859 | https://github.com/pjsip/pjproject | https://github.com/pjsip/pjproject/commit/f74c1fc22b760d2a24369aa72c74c4a9ab985859 | Merge pull request from GHSA-r374-qrwv-86hh | 1 | void pjmedia_rtcp_xr_rx_rtcp_xr( pjmedia_rtcp_xr_session *sess,
const void *pkt,
pj_size_t size)
{
const pjmedia_rtcp_xr_pkt *rtcp_xr = (pjmedia_rtcp_xr_pkt*) pkt;
const pjmedia_rtcp_xr_rb_rr_time *rb_rr_time = NULL;
const pjmedia_rtcp_xr_rb_dlrr *rb_dlrr = NULL;
const pjmedia_rtcp_... | 128531615202269817130665554219664776865 | rtcp_xr.c | 114410540091951766279707779044798368853 | CWE-125 | CVE-2021-43845 | PJSIP is a free and open source multimedia communication library. In version 2.11.1 and prior, if incoming RTCP XR message contain block, the data field is not checked against the received packet size, potentially resulting in an out-of-bound read access. This affects all users that use PJMEDIA and RTCP XR. A malicious... | https://nvd.nist.gov/vuln/detail/CVE-2021-43845 |
222,737 | pjproject | f74c1fc22b760d2a24369aa72c74c4a9ab985859 | https://github.com/pjsip/pjproject | https://github.com/pjsip/pjproject/commit/f74c1fc22b760d2a24369aa72c74c4a9ab985859 | Merge pull request from GHSA-r374-qrwv-86hh | 0 | void pjmedia_rtcp_xr_rx_rtcp_xr( pjmedia_rtcp_xr_session *sess,
const void *pkt,
pj_size_t size)
{
const pjmedia_rtcp_xr_pkt *rtcp_xr = (pjmedia_rtcp_xr_pkt*) pkt;
const pjmedia_rtcp_xr_rb_rr_time *rb_rr_time = NULL;
const pjmedia_rtcp_xr_rb_dlrr *rb_dlrr = NULL;
const pjmedia_rtcp_... | 134123814969944330757535232446891920936 | rtcp_xr.c | 238632209992792964107720594546671940595 | CWE-125 | CVE-2021-43845 | PJSIP is a free and open source multimedia communication library. In version 2.11.1 and prior, if incoming RTCP XR message contain block, the data field is not checked against the received packet size, potentially resulting in an out-of-bound read access. This affects all users that use PJMEDIA and RTCP XR. A malicious... | https://nvd.nist.gov/vuln/detail/CVE-2021-43845 |
195,231 | gpac | 893fb99b606eebfae46cde151846a980e689039b | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/893fb99b606eebfae46cde151846a980e689039b | fixed #1902 | 1 | s32 gf_avc_parse_nalu(GF_BitStream *bs, AVCState *avc)
{
u8 idr_flag;
s32 slice, ret;
u32 nal_hdr;
AVCSliceInfo n_state;
gf_bs_enable_emulation_byte_removal(bs, GF_TRUE);
nal_hdr = gf_bs_read_u8(bs);
slice = 0;
memcpy(&n_state, &avc->s_info, sizeof(AVCSliceInfo));
avc->last_nal_type_parsed = n_state.nal_uni... | 99100226875075764129164909998725433232 | av_parsers.c | 168517587328341017594269375399465893964 | CWE-476 | CVE-2021-40565 | A Segmentation fault caused by a null pointer dereference vulnerability exists in Gpac through 1.0.1 via the gf_avc_parse_nalu function in av_parsers.c when using mp4box, which causes a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2021-40565 |
222,739 | gpac | 893fb99b606eebfae46cde151846a980e689039b | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/893fb99b606eebfae46cde151846a980e689039b | fixed #1902 | 0 | s32 gf_avc_parse_nalu(GF_BitStream *bs, AVCState *avc)
{
u8 idr_flag;
s32 slice, ret;
u32 nal_hdr;
AVCSliceInfo n_state;
gf_bs_enable_emulation_byte_removal(bs, GF_TRUE);
nal_hdr = gf_bs_read_u8(bs);
slice = 0;
memcpy(&n_state, &avc->s_info, sizeof(AVCSliceInfo));
avc->last_nal_type_parsed = n_state.nal_uni... | 151148020238252563376772611575796474624 | av_parsers.c | 336095072032702615903888752582747164805 | CWE-476 | CVE-2021-40565 | A Segmentation fault caused by a null pointer dereference vulnerability exists in Gpac through 1.0.1 via the gf_avc_parse_nalu function in av_parsers.c when using mp4box, which causes a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2021-40565 |
195,233 | tensorflow | 97282c6d0d34476b6ba033f961590b783fa184cd | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/97282c6d0d34476b6ba033f961590b783fa184cd | Prevent a crash due to heap OOB write in grappler.
PiperOrigin-RevId: 408318417
Change-Id: If095feb8c001e3a8ac4a85b7387b81e8309df47d | 1 | Status SetUnknownShape(const NodeDef* node, int output_port) {
shape_inference::ShapeHandle shape =
GetUnknownOutputShape(node, output_port);
InferenceContext* ctx = GetContext(node);
if (ctx == nullptr) {
return errors::InvalidArgument("Missing context");
}
ctx->set_output(output_po... | 128649942367020682781968122888762734954 | graph_properties.cc | 2473148557397819170260688514824580473 | CWE-787 | CVE-2022-23566 | Tensorflow is an Open Source Machine Learning Framework. TensorFlow is vulnerable to a heap OOB write in `Grappler`. The `set_output` function writes to an array at the specified index. Hence, this gives a malicious user a write primitive. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commi... | https://nvd.nist.gov/vuln/detail/CVE-2022-23566 |
222,906 | tensorflow | 97282c6d0d34476b6ba033f961590b783fa184cd | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/97282c6d0d34476b6ba033f961590b783fa184cd | Prevent a crash due to heap OOB write in grappler.
PiperOrigin-RevId: 408318417
Change-Id: If095feb8c001e3a8ac4a85b7387b81e8309df47d | 0 | Status SetUnknownShape(const NodeDef* node, int output_port) {
shape_inference::ShapeHandle shape =
GetUnknownOutputShape(node, output_port);
InferenceContext* ctx = GetContext(node);
if (ctx == nullptr) {
return errors::InvalidArgument("SetUnknownShape: Missing context");
}
if (outp... | 99847293040079140904834991959660799210 | graph_properties.cc | 331642930758873609530408829371906855419 | CWE-787 | CVE-2022-23566 | Tensorflow is an Open Source Machine Learning Framework. TensorFlow is vulnerable to a heap OOB write in `Grappler`. The `set_output` function writes to an array at the specified index. Hence, this gives a malicious user a write primitive. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commi... | https://nvd.nist.gov/vuln/detail/CVE-2022-23566 |
195,234 | tensorflow | dcc21c7bc972b10b6fb95c2fb0f4ab5a59680ec2 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/dcc21c7bc972b10b6fb95c2fb0f4ab5a59680ec2 | Eliminate debug `CHECK`-fail from `function.cc`
PiperOrigin-RevId: 409416119
Change-Id: I8376ee464d434e9b970ff0ad49edfdaa2a273cfe | 1 | Status BuildInputArgIndex(const OpDef::ArgDef& arg_def, AttrSlice attr_values,
const FunctionDef::ArgAttrs* arg_attrs,
bool ints_on_device,
int64_t resource_arg_unique_id) {
bool is_type_list;
DataTypeVector dtypes;
TF_RET... | 149416980820983113024454385523610384435 | function.cc | 275755455359751936167516531130081059449 | CWE-617 | CVE-2022-23586 | Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that assertions in `function.cc` would be falsified and crash the Python interpreter. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.... | https://nvd.nist.gov/vuln/detail/CVE-2022-23586 |
222,925 | tensorflow | dcc21c7bc972b10b6fb95c2fb0f4ab5a59680ec2 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/dcc21c7bc972b10b6fb95c2fb0f4ab5a59680ec2 | Eliminate debug `CHECK`-fail from `function.cc`
PiperOrigin-RevId: 409416119
Change-Id: I8376ee464d434e9b970ff0ad49edfdaa2a273cfe | 0 | Status BuildInputArgIndex(const OpDef::ArgDef& arg_def, AttrSlice attr_values,
const FunctionDef::ArgAttrs* arg_attrs,
bool ints_on_device,
int64_t resource_arg_unique_id) {
bool is_type_list;
DataTypeVector dtypes;
TF_RET... | 331541162268703307546562637087708050413 | None | CWE-617 | CVE-2022-23586 | Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that assertions in `function.cc` would be falsified and crash the Python interpreter. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.... | https://nvd.nist.gov/vuln/detail/CVE-2022-23586 | |
195,237 | ImageMagick | f221ea0fa3171f0f4fdf74ac9d81b203b9534c23 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23 | Fixes #4985: 4e+26 is outside the range of representable values of type 'unsigned long' at coders/pcl.c:299 (#4986)
* fix Division by zero in XMenuWidget() of MagickCore/widget.c
* Fix memory leak in AnimateImageCommand() of MagickWand/animate.c and DisplayImageCommand() of MagickWand/display.c
* fix Division by zer... | 1 | static Image *ReadPCLImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define CropBox "CropBox"
#define DeviceCMYK "DeviceCMYK"
#define MediaBox "MediaBox"
#define RenderPCLText " Rendering PCL... "
char
command[MagickPathExtent],
*density,
filename[MagickPathExtent],
geometry[Magi... | 164108098598115354275502589345492195560 | pcl.c | 226900089914426038554396055314138187051 | CWE-190 | CVE-2022-32546 | A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior. | https://nvd.nist.gov/vuln/detail/CVE-2022-32546 |
223,089 | ImageMagick | f221ea0fa3171f0f4fdf74ac9d81b203b9534c23 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23 | Fixes #4985: 4e+26 is outside the range of representable values of type 'unsigned long' at coders/pcl.c:299 (#4986)
* fix Division by zero in XMenuWidget() of MagickCore/widget.c
* Fix memory leak in AnimateImageCommand() of MagickWand/animate.c and DisplayImageCommand() of MagickWand/display.c
* fix Division by zer... | 0 | static Image *ReadPCLImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define CropBox "CropBox"
#define DeviceCMYK "DeviceCMYK"
#define MediaBox "MediaBox"
#define RenderPCLText " Rendering PCL... "
char
command[MagickPathExtent],
*density,
filename[MagickPathExtent],
geometry[Magi... | 19106273782202991773902274267597206156 | pcl.c | 107050694639473008713363285641232916868 | CWE-190 | CVE-2022-32546 | A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior. | https://nvd.nist.gov/vuln/detail/CVE-2022-32546 |
195,264 | pcre2 | d4fa336fbcc388f89095b184ba6d99422cfc676c | https://github.com/PCRE2Project/pcre2 | https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c | Fix incorrect value reading in JIT. | 1 | static void compile_xclass_matchingpath(compiler_common *common, PCRE2_SPTR cc, jump_list **backtracks)
{
DEFINE_COMPILER;
jump_list *found = NULL;
jump_list **list = (cc[0] & XCL_NOT) == 0 ? &found : backtracks;
sljit_uw c, charoffset, max = 256, min = READ_CHAR_MAX;
struct sljit_jump *jump = NULL;
PCRE2_SPTR ccbegin;... | 183419698766008283102134937176756315954 | pcre2_jit_compile.c | 284265016287060690142505784626516203619 | CWE-125 | CVE-2022-1586 | An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching with... | https://nvd.nist.gov/vuln/detail/CVE-2022-1586 |
223,368 | pcre2 | d4fa336fbcc388f89095b184ba6d99422cfc676c | https://github.com/PCRE2Project/pcre2 | https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c | Fix incorrect value reading in JIT. | 0 | static void compile_xclass_matchingpath(compiler_common *common, PCRE2_SPTR cc, jump_list **backtracks)
{
DEFINE_COMPILER;
jump_list *found = NULL;
jump_list **list = (cc[0] & XCL_NOT) == 0 ? &found : backtracks;
sljit_uw c, charoffset, max = 256, min = READ_CHAR_MAX;
struct sljit_jump *jump = NULL;
PCRE2_SPTR ccbegin;... | 144276531294134211562638848702422655084 | pcre2_jit_compile.c | 52374969195278947710795935639555031915 | CWE-125 | CVE-2022-1586 | An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching with... | https://nvd.nist.gov/vuln/detail/CVE-2022-1586 |
195,274 | tensorflow | 0a365c029e437be0349c31f8d4c9926b69fa3fa1 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/0a365c029e437be0349c31f8d4c9926b69fa3fa1 | Prevent null pointer dereference in constant folding.
Under certain conditions, an invalid protobuf saved model with invalid nodes would be loaded. During optimization phase, Grappler optimizer will then dereference a null pointer.
PiperOrigin-RevId: 409683530
Change-Id: I1f10340a7ec384bc9bc587300390f1078cf5caa0 | 1 | bool ConstantFolding::MulConvPushDown(GraphDef* optimized_graph, NodeDef* node,
const GraphProperties& properties) {
// Push down multiplication on ConvND.
// * ConvND
// / \ / \
// ... | 134451371039665673916173676790439576039 | constant_folding.cc | 221573695858123615640237954647315751120 | CWE-476 | CVE-2022-23589 | Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the sec... | https://nvd.nist.gov/vuln/detail/CVE-2022-23589 |
223,728 | tensorflow | 0a365c029e437be0349c31f8d4c9926b69fa3fa1 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/0a365c029e437be0349c31f8d4c9926b69fa3fa1 | Prevent null pointer dereference in constant folding.
Under certain conditions, an invalid protobuf saved model with invalid nodes would be loaded. During optimization phase, Grappler optimizer will then dereference a null pointer.
PiperOrigin-RevId: 409683530
Change-Id: I1f10340a7ec384bc9bc587300390f1078cf5caa0 | 0 | bool ConstantFolding::MulConvPushDown(GraphDef* optimized_graph, NodeDef* node,
const GraphProperties& properties) {
// Push down multiplication on ConvND.
// * ConvND
// / \ / \
// ... | 283045777051933437914385494105493059717 | constant_folding.cc | 149567017925135188078420823730624272905 | CWE-476 | CVE-2022-23589 | Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the sec... | https://nvd.nist.gov/vuln/detail/CVE-2022-23589 |
195,291 | tensorflow | ef1d027be116f25e25bb94a60da491c2cf55bd0b | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/ef1d027be116f25e25bb94a60da491c2cf55bd0b | Prevent copying uninitialized data in `AssignOp`.
This prevents harder to debug undefined behaviors that cannot be traced back to the original tensor after assignments occur earlier in the graph execution. Several of these undefined behaviors are just reference bindings to null pointers, which are caught when running ... | 1 | void Compute(OpKernelContext* context) override {
const Tensor& rhs = context->input(1);
// We always return the input ref.
context->forward_ref_input_to_ref_output(0, 0);
// We can't always know how this value will be used downstream, so make
// conservative assumptions in specifying constraint... | 110563830933859876998490806365273446744 | assign_op.h | 69919930869774703131816695670485389180 | CWE-908 | CVE-2022-23573 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `AssignOp` can result in copying uninitialized data to a new tensor. This later results in undefined behavior. The implementation has a check that the left hand side of the assignment is initialized (to minimize number of allocations), but d... | https://nvd.nist.gov/vuln/detail/CVE-2022-23573 |
224,153 | tensorflow | ef1d027be116f25e25bb94a60da491c2cf55bd0b | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/ef1d027be116f25e25bb94a60da491c2cf55bd0b | Prevent copying uninitialized data in `AssignOp`.
This prevents harder to debug undefined behaviors that cannot be traced back to the original tensor after assignments occur earlier in the graph execution. Several of these undefined behaviors are just reference bindings to null pointers, which are caught when running ... | 0 | void Compute(OpKernelContext* context) override {
const Tensor& rhs = context->input(1);
// We always return the input ref.
context->forward_ref_input_to_ref_output(0, 0);
// Prevent copying uninitialized data, to solve harder to debug undefined
// behaviors that cannot be traced back to the ori... | 305037740106398797533289727050001288809 | assign_op.h | 227740622376075800348272805227748641889 | CWE-908 | CVE-2022-23573 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `AssignOp` can result in copying uninitialized data to a new tensor. This later results in undefined behavior. The implementation has a check that the left hand side of the assignment is initialized (to minimize number of allocations), but d... | https://nvd.nist.gov/vuln/detail/CVE-2022-23573 |
195,293 | mruby | ae3c99767a27f5c6c584162e2adc6a5d0eb2c54e | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/ae3c99767a27f5c6c584162e2adc6a5d0eb2c54e | codegen.c: fixed a bug in hash code generation with `!val`. | 1 | gen_hash(codegen_scope *s, node *tree, int val, int limit)
{
int slimit = GEN_VAL_STACK_MAX;
if (cursp() >= GEN_LIT_ARY_MAX) slimit = INT16_MAX;
int len = 0;
mrb_bool update = FALSE;
while (tree) {
if (nint(tree->car->car->car) == NODE_KW_REST_ARGS) {
if (len > 0) {
pop_n(len*2);
if... | 193019522040384116683756187518117428466 | codegen.c | 187346573288549092337421927147361320618 | CWE-476 | CVE-2022-0481 | NULL Pointer Dereference in Homebrew mruby prior to 3.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-0481 |
224,154 | mruby | ae3c99767a27f5c6c584162e2adc6a5d0eb2c54e | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/ae3c99767a27f5c6c584162e2adc6a5d0eb2c54e | codegen.c: fixed a bug in hash code generation with `!val`. | 0 | gen_hash(codegen_scope *s, node *tree, int val, int limit)
{
int slimit = GEN_VAL_STACK_MAX;
if (cursp() >= GEN_LIT_ARY_MAX) slimit = INT16_MAX;
int len = 0;
mrb_bool update = FALSE;
while (tree) {
if (nint(tree->car->car->car) == NODE_KW_REST_ARGS) {
if (val && len > 0) {
pop_n(len*2);
... | 86249756338106133378324988596644701448 | None | CWE-476 | CVE-2022-0481 | NULL Pointer Dereference in Homebrew mruby prior to 3.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-0481 | |
195,294 | tensorflow | f57315566d7094f322b784947093406c2aea0d7d | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/f57315566d7094f322b784947093406c2aea0d7d | Add a check for Key being scalar tensor for MapStage and OrderedMapStage ops.
According to documentation[1][2], key must be int64 value, but this wasn't enforced and the ops would fail with check failure for non-scalar key value.
[1]https://www.tensorflow.org/api_docs/cc/class/tensorflow/ops/ordered-map-stage
[2]http... | 1 | void Compute(OpKernelContext* ctx) override {
StagingMap<Ordered>* map = nullptr;
OP_REQUIRES_OK(ctx, GetStagingMap(ctx, def(), &map));
core::ScopedUnref scope(map);
typename StagingMap<Ordered>::OptionalTuple tuple;
const Tensor* key_tensor;
const Tensor* indices_tensor;
OpInputList valu... | 121343016950748954777477429164526353429 | map_stage_op.cc | 156634864064326951745718193254274952325 | CWE-843 | CVE-2022-21734 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `MapStage` is vulnerable a `CHECK`-fail if the key tensor is not a scalar. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affec... | https://nvd.nist.gov/vuln/detail/CVE-2022-21734 |
224,181 | tensorflow | f57315566d7094f322b784947093406c2aea0d7d | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/f57315566d7094f322b784947093406c2aea0d7d | Add a check for Key being scalar tensor for MapStage and OrderedMapStage ops.
According to documentation[1][2], key must be int64 value, but this wasn't enforced and the ops would fail with check failure for non-scalar key value.
[1]https://www.tensorflow.org/api_docs/cc/class/tensorflow/ops/ordered-map-stage
[2]http... | 0 | void Compute(OpKernelContext* ctx) override {
StagingMap<Ordered>* map = nullptr;
OP_REQUIRES_OK(ctx, GetStagingMap(ctx, def(), &map));
core::ScopedUnref scope(map);
typename StagingMap<Ordered>::OptionalTuple tuple;
const Tensor* key_tensor;
const Tensor* indices_tensor;
OpInputList valu... | 155761287933118551217083530225572870599 | map_stage_op.cc | 98786060535014659477894352363015597620 | CWE-843 | CVE-2022-21734 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `MapStage` is vulnerable a `CHECK`-fail if the key tensor is not a scalar. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affec... | https://nvd.nist.gov/vuln/detail/CVE-2022-21734 |
195,295 | mruby | c8c083cb750606b2da81582cd8e43b442bb143e6 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/c8c083cb750606b2da81582cd8e43b442bb143e6 | codegen.c: need to pack argument when `n==13` too.
Because we have extra 2 arguments coming (kw and rhs). | 1 | gen_assignment(codegen_scope *s, node *tree, node *rhs, int sp, int val)
{
int idx;
int type = nint(tree->car);
switch (type) {
case NODE_GVAR:
case NODE_ARG:
case NODE_LVAR:
case NODE_IVAR:
case NODE_CVAR:
case NODE_CONST:
case NODE_NIL:
case NODE_MASGN:
if (rhs) {
codegen(s, rhs, VAL)... | 41954898060187653186067747247923282324 | codegen.c | 166306575091061367964033452033729491771 | CWE-125 | CVE-2022-1276 | Out-of-bounds Read in mrb_get_args in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited. | https://nvd.nist.gov/vuln/detail/CVE-2022-1276 |
224,192 | mruby | c8c083cb750606b2da81582cd8e43b442bb143e6 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/c8c083cb750606b2da81582cd8e43b442bb143e6 | codegen.c: need to pack argument when `n==13` too.
Because we have extra 2 arguments coming (kw and rhs). | 0 | gen_assignment(codegen_scope *s, node *tree, node *rhs, int sp, int val)
{
int idx;
int type = nint(tree->car);
switch (type) {
case NODE_GVAR:
case NODE_ARG:
case NODE_LVAR:
case NODE_IVAR:
case NODE_CVAR:
case NODE_CONST:
case NODE_NIL:
case NODE_MASGN:
if (rhs) {
codegen(s, rhs, VAL)... | 72719402367551467019466616883888506134 | codegen.c | 21664036215001583958906059719703447460 | CWE-125 | CVE-2022-1276 | Out-of-bounds Read in mrb_get_args in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited. | https://nvd.nist.gov/vuln/detail/CVE-2022-1276 |
195,296 | uWebSockets | 03fca626a95130ab80f86adada54b29d27242759 | https://github.com/uWebSockets/uWebSockets | https://github.com/uWebSockets/uWebSockets/commit/03fca626a95130ab80f86adada54b29d27242759 | Fix overflow of triggered topics | 1 | void publish(Topic *iterator, size_t start, size_t stop, std::string_view topic, std::pair<std::string_view, std::string_view> message) {
/* If we already have 64 triggered topics make sure to drain it here */
if (numTriggeredTopics == 64) {
drain();
}
/* Iterate over al... | 134169268379037550524482088626348972483 | TopicTree.h | 203813195164088557620454025257855576407 | CWE-787 | CVE-2020-36406 | uWebSockets 18.11.0 and 18.12.0 has a stack-based buffer overflow in uWS::TopicTree::trimTree (called from uWS::TopicTree::unsubscribeAll). NOTE: the vendor's position is that this is "a minor issue or not even an issue at all" because the developer of an application (that uses uWebSockets) should not be allowing the l... | https://nvd.nist.gov/vuln/detail/CVE-2020-36406 |
224,208 | uWebSockets | 03fca626a95130ab80f86adada54b29d27242759 | https://github.com/uWebSockets/uWebSockets | https://github.com/uWebSockets/uWebSockets/commit/03fca626a95130ab80f86adada54b29d27242759 | Fix overflow of triggered topics | 0 | void publish(Topic *iterator, size_t start, size_t stop, std::string_view topic, std::pair<std::string_view, std::string_view> message) {
/* Iterate over all segments in given topic */
for (; stop != std::string::npos; start = stop + 1) {
stop = topic.find('/', start);
std::... | 239871427944982498561615868059507506120 | TopicTree.h | 110499788872538385962916215167459222787 | CWE-787 | CVE-2020-36406 | uWebSockets 18.11.0 and 18.12.0 has a stack-based buffer overflow in uWS::TopicTree::trimTree (called from uWS::TopicTree::unsubscribeAll). NOTE: the vendor's position is that this is "a minor issue or not even an issue at all" because the developer of an application (that uses uWebSockets) should not be allowing the l... | https://nvd.nist.gov/vuln/detail/CVE-2020-36406 |
195,308 | flatpak | 462fca2c666e0cd2b60d6d2593a7216a83047aaf | https://github.com/flatpak/flatpak | https://github.com/flatpak/flatpak/commit/462fca2c666e0cd2b60d6d2593a7216a83047aaf | run: Don't allow chroot()
If we don't allow pivot_root() then there seems no reason why we should
allow chroot().
Partially fixes GHSA-67h7-w3jq-vh4q.
Signed-off-by: Simon McVittie <smcv@collabora.com> | 1 | setup_seccomp (FlatpakBwrap *bwrap,
const char *arch,
gulong allowed_personality,
FlatpakRunFlags run_flags,
GError **error)
{
gboolean multiarch = (run_flags & FLATPAK_RUN_FLAG_MULTIARCH) != 0;
gboolean devel = (run_flags & FLATPAK_R... | 116661486604620809625071911593237669795 | flatpak-run.c | 32398709380082441128978861691951488575 | CWE-20 | CVE-2021-41133 | Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak... | https://nvd.nist.gov/vuln/detail/CVE-2021-41133 |
224,277 | flatpak | 462fca2c666e0cd2b60d6d2593a7216a83047aaf | https://github.com/flatpak/flatpak | https://github.com/flatpak/flatpak/commit/462fca2c666e0cd2b60d6d2593a7216a83047aaf | run: Don't allow chroot()
If we don't allow pivot_root() then there seems no reason why we should
allow chroot().
Partially fixes GHSA-67h7-w3jq-vh4q.
Signed-off-by: Simon McVittie <smcv@collabora.com> | 0 | setup_seccomp (FlatpakBwrap *bwrap,
const char *arch,
gulong allowed_personality,
FlatpakRunFlags run_flags,
GError **error)
{
gboolean multiarch = (run_flags & FLATPAK_RUN_FLAG_MULTIARCH) != 0;
gboolean devel = (run_flags & FLATPAK_R... | 98799963199923512278205367577377591800 | flatpak-run.c | 147844647821640300549119412024985340412 | CWE-20 | CVE-2021-41133 | Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak... | https://nvd.nist.gov/vuln/detail/CVE-2021-41133 |
195,309 | squid | 5e2ea2b13bd98f53e29964ca26bb0d602a8a12b9 | https://github.com/squid-cache/squid | https://github.com/squid-cache/squid/commit/5e2ea2b13bd98f53e29964ca26bb0d602a8a12b9 | Improve handling of Gopher responses (#1022) | 1 | gopherToHTML(GopherStateData * gopherState, char *inbuf, int len)
{
char *pos = inbuf;
char *lpos = NULL;
char *tline = NULL;
LOCAL_ARRAY(char, line, TEMP_BUF_SIZE);
LOCAL_ARRAY(char, tmpbuf, TEMP_BUF_SIZE);
char *name = NULL;
char *selector = NULL;
char *host = NULL;
char *port = NU... | 274182330078791984686066092776381139807 | gopher.cc | 53940162348551394934251092714566998881 | CWE-400 | CVE-2021-46784 | In Squid 3.x through 3.5.28, 4.x through 4.17, and 5.x before 5.6, due to improper buffer management, a Denial of Service can occur when processing long Gopher server responses. | https://nvd.nist.gov/vuln/detail/CVE-2021-46784 |
224,281 | squid | 5e2ea2b13bd98f53e29964ca26bb0d602a8a12b9 | https://github.com/squid-cache/squid | https://github.com/squid-cache/squid/commit/5e2ea2b13bd98f53e29964ca26bb0d602a8a12b9 | Improve handling of Gopher responses (#1022) | 0 | gopherToHTML(GopherStateData * gopherState, char *inbuf, int len)
{
char *pos = inbuf;
char *lpos = NULL;
char *tline = NULL;
LOCAL_ARRAY(char, line, TEMP_BUF_SIZE);
char *name = NULL;
char *selector = NULL;
char *host = NULL;
char *port = NULL;
char *escaped_selector = NULL;
con... | 21640942922320975299915998505575451737 | gopher.cc | 190939052563115961351574589449206812826 | CWE-400 | CVE-2021-46784 | In Squid 3.x through 3.5.28, 4.x through 4.17, and 5.x before 5.6, due to improper buffer management, a Denial of Service can occur when processing long Gopher server responses. | https://nvd.nist.gov/vuln/detail/CVE-2021-46784 |
195,328 | gpac | 30ac5e5236b790accd1f25347eebf2dc8c6c1bcb | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/30ac5e5236b790accd1f25347eebf2dc8c6c1bcb | fixed #1897 | 1 | char *gf_text_get_utf8_line(char *szLine, u32 lineSize, FILE *txt_in, s32 unicode_type)
{
u32 i, j, len;
char *sOK;
char szLineConv[1024];
unsigned short *sptr;
memset(szLine, 0, sizeof(char)*lineSize);
sOK = gf_fgets(szLine, lineSize, txt_in);
if (!sOK) return NULL;
if (unicode_type<=1) {
j=0;
len = (u32)... | 117427486429117846714647428036887377373 | load_text.c | 196742273187479774331460388493063544419 | CWE-415 | CVE-2021-40574 | The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the gf_text_get_utf8_line function in load_text.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges. | https://nvd.nist.gov/vuln/detail/CVE-2021-40574 |
224,472 | gpac | 30ac5e5236b790accd1f25347eebf2dc8c6c1bcb | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/30ac5e5236b790accd1f25347eebf2dc8c6c1bcb | fixed #1897 | 0 | char *gf_text_get_utf8_line(char *szLine, u32 lineSize, FILE *txt_in, s32 unicode_type)
{
u32 i, j, len;
char *sOK;
char szLineConv[2048];
unsigned short *sptr;
memset(szLine, 0, sizeof(char)*lineSize);
sOK = gf_fgets(szLine, lineSize, txt_in);
if (!sOK) return NULL;
if (unicode_type<=1) {
j=0;
len = (u32)... | 206448432363907113546512643676658303982 | load_text.c | 270779576910744156479880021794579702395 | CWE-415 | CVE-2021-40574 | The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the gf_text_get_utf8_line function in load_text.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges. | https://nvd.nist.gov/vuln/detail/CVE-2021-40574 |
195,331 | tensorflow | 08d7b00c0a5a20926363849f611729f53f3ec022 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022 | Fix Segfault in Concat V2 shape function.
PiperOrigin-RevId: 412120654
Change-Id: I3ff915faea694f9ad8b00024e9af2de9909011be | 1 | Status ConcatShapeHelper(InferenceContext* c, int start_value_index,
int end_value_index, int dim_index) {
ShapeHandle unused;
TF_RETURN_IF_ERROR(c->WithRank(c->input(dim_index), 0, &unused));
const Tensor* concat_dim_t = c->input_tensor(dim_index);
if (concat_dim_t == nullptr) {
//... | 115004012549325804010611397133680502113 | common_shape_fns.cc | 114394888048780454732842913577124501919 | CWE-843 | CVE-2022-21731 | Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `ConcatV2` can be used to trigger a denial of service attack via a segfault caused by a type confusion. The `axis` argument is translated into `concat_dim` in the `ConcatShapeHelper` helper function. Then, a value for `mi... | https://nvd.nist.gov/vuln/detail/CVE-2022-21731 |
224,570 | tensorflow | 08d7b00c0a5a20926363849f611729f53f3ec022 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022 | Fix Segfault in Concat V2 shape function.
PiperOrigin-RevId: 412120654
Change-Id: I3ff915faea694f9ad8b00024e9af2de9909011be | 0 | Status ConcatShapeHelper(InferenceContext* c, int start_value_index,
int end_value_index, int dim_index) {
ShapeHandle unused;
TF_RETURN_IF_ERROR(c->WithRank(c->input(dim_index), 0, &unused));
const Tensor* concat_dim_t = c->input_tensor(dim_index);
if (concat_dim_t == nullptr) {
//... | 224848617993634630925206364943386826300 | common_shape_fns.cc | 56524265073448960566855170405566896543 | CWE-843 | CVE-2022-21731 | Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `ConcatV2` can be used to trigger a denial of service attack via a segfault caused by a type confusion. The `axis` argument is translated into `concat_dim` in the `ConcatShapeHelper` helper function. Then, a value for `mi... | https://nvd.nist.gov/vuln/detail/CVE-2022-21731 |
195,334 | gpac | b03c9f252526bb42fbd1b87b9f5e339c3cf2390a | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/b03c9f252526bb42fbd1b87b9f5e339c3cf2390a | fixed #1890 | 1 | GF_Err iloc_box_read(GF_Box *s, GF_BitStream *bs)
{
u32 item_count, extent_count, i, j;
GF_ItemLocationBox *ptr = (GF_ItemLocationBox *)s;
ISOM_DECREASE_SIZE(ptr, 2)
ptr->offset_size = gf_bs_read_int(bs, 4);
ptr->length_size = gf_bs_read_int(bs, 4);
ptr->base_offset_size = gf_bs_read_int(bs, 4);
if (ptr->versio... | 85275035202223574859308673912965262169 | box_code_meta.c | 315220373545459860670428553876078791185 | CWE-415 | CVE-2021-40573 | The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the gf_list_del function in list.c, which allows attackers to cause a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2021-40573 |
224,728 | gpac | b03c9f252526bb42fbd1b87b9f5e339c3cf2390a | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/b03c9f252526bb42fbd1b87b9f5e339c3cf2390a | fixed #1890 | 0 | GF_Err iloc_box_read(GF_Box *s, GF_BitStream *bs)
{
u32 item_count, extent_count, i, j;
GF_ItemLocationBox *ptr = (GF_ItemLocationBox *)s;
ISOM_DECREASE_SIZE(ptr, 2)
ptr->offset_size = gf_bs_read_int(bs, 4);
ptr->length_size = gf_bs_read_int(bs, 4);
ptr->base_offset_size = gf_bs_read_int(bs, 4);
if (ptr->versio... | 326603429121921341428150431158212875495 | box_code_meta.c | 99521214022509816524954281629288020612 | CWE-415 | CVE-2021-40573 | The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the gf_list_del function in list.c, which allows attackers to cause a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2021-40573 |
195,340 | tensorflow | e952a89b7026b98fe8cbe626514a93ed68b7c510 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/e952a89b7026b98fe8cbe626514a93ed68b7c510 | Prevent overflow in sparse dense cwise ops.
PiperOrigin-RevId: 415543171
Change-Id: I22dab7c41be2121ab5efe5403ca0e2f9b7cb24b8 | 1 | void Compute(OpKernelContext *ctx) override {
const Tensor *indices_t, *values_t, *shape_t, *dense_t;
OP_REQUIRES_OK(ctx, ctx->input("sp_indices", &indices_t));
OP_REQUIRES_OK(ctx, ctx->input("sp_values", &values_t));
OP_REQUIRES_OK(ctx, ctx->input("sp_shape", &shape_t));
OP_REQUIRES_OK(ctx, ctx->... | 171281295800875024521736226102204042037 | sparse_dense_binary_op_shared.cc | 32986558098184077015668984064800916453 | CWE-190 | CVE-2022-23567 | Tensorflow is an Open Source Machine Learning Framework. The implementations of `Sparse*Cwise*` ops are vulnerable to integer overflows. These can be used to trigger large allocations (so, OOM based denial of service) or `CHECK`-fails when building new `TensorShape` objects (so, assert failures based denial of service)... | https://nvd.nist.gov/vuln/detail/CVE-2022-23567 |
224,862 | tensorflow | e952a89b7026b98fe8cbe626514a93ed68b7c510 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/e952a89b7026b98fe8cbe626514a93ed68b7c510 | Prevent overflow in sparse dense cwise ops.
PiperOrigin-RevId: 415543171
Change-Id: I22dab7c41be2121ab5efe5403ca0e2f9b7cb24b8 | 0 | void Compute(OpKernelContext *ctx) override {
const Tensor *indices_t, *values_t, *shape_t, *dense_t;
OP_REQUIRES_OK(ctx, ctx->input("sp_indices", &indices_t));
OP_REQUIRES_OK(ctx, ctx->input("sp_values", &values_t));
OP_REQUIRES_OK(ctx, ctx->input("sp_shape", &shape_t));
OP_REQUIRES_OK(ctx, ctx->... | 278624482255408254449933942747189407257 | sparse_dense_binary_op_shared.cc | 247841744604256295308587005697650201397 | CWE-190 | CVE-2022-23567 | Tensorflow is an Open Source Machine Learning Framework. The implementations of `Sparse*Cwise*` ops are vulnerable to integer overflows. These can be used to trigger large allocations (so, OOM based denial of service) or `CHECK`-fails when building new `TensorShape` objects (so, assert failures based denial of service)... | https://nvd.nist.gov/vuln/detail/CVE-2022-23567 |
195,343 | tensorflow | 002408c3696b173863228223d535f9de72a101a9 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/002408c3696b173863228223d535f9de72a101a9 | Add negative bound check for row and column pooling_sequence in FractionalAvgPoolGrad op to avoid out of bound heap access
PiperOrigin-RevId: 413837346
Change-Id: I2b86034101df31bee161abcb781755e236c7bccd | 1 | void Compute(OpKernelContext* context) override {
// Here's the basic idea:
// Batch and depth dimension are independent from row and col dimension. And
// because FractionalAvgPool currently only support pooling along row and
// col, we can basically think of this 4D tensor backpropagation as
// ... | 91555834572386312187860770421206034544 | fractional_avg_pool_op.cc | 221866619851129952189561551151828727755 | CWE-125 | CVE-2022-21730 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `FractionalAvgPoolGrad` does not consider cases where the input tensors are invalid allowing an attacker to read from outside of bounds of heap. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow ... | https://nvd.nist.gov/vuln/detail/CVE-2022-21730 |
224,891 | tensorflow | 002408c3696b173863228223d535f9de72a101a9 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/002408c3696b173863228223d535f9de72a101a9 | Add negative bound check for row and column pooling_sequence in FractionalAvgPoolGrad op to avoid out of bound heap access
PiperOrigin-RevId: 413837346
Change-Id: I2b86034101df31bee161abcb781755e236c7bccd | 0 | void Compute(OpKernelContext* context) override {
// Here's the basic idea:
// Batch and depth dimension are independent from row and col dimension. And
// because FractionalAvgPool currently only support pooling along row and
// col, we can basically think of this 4D tensor backpropagation as
// ... | 7916647560171328705762237734439424087 | fractional_avg_pool_op.cc | 273616659727040190050886150342189772450 | CWE-125 | CVE-2022-21730 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `FractionalAvgPoolGrad` does not consider cases where the input tensors are invalid allowing an attacker to read from outside of bounds of heap. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow ... | https://nvd.nist.gov/vuln/detail/CVE-2022-21730 |
195,385 | flatpak | 65cbfac982cb1c83993a9e19aa424daee8e9f042 | https://github.com/flatpak/flatpak | https://github.com/flatpak/flatpak/commit/65cbfac982cb1c83993a9e19aa424daee8e9f042 | Ensure that bundles have metadata on install
If we have a bundle without metadata we wouldn't properly present
the permissions in the transaction. | 1 | flatpak_dir_ensure_bundle_remote (FlatpakDir *self,
GFile *file,
GBytes *extra_gpg_data,
FlatpakDecomposed **out_ref,
char **out_checksum,... | 117751554146896350574194025697057651898 | flatpak-dir.c | 41005800026546918810123079124181990480 | CWE-276 | CVE-2021-43860 | Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.12.3 and 1.10.6, Flatpak doesn't properly validate that the permissions displayed to the user for an app at install time match the actual permissions granted to the app at runtime, in the case that there's a null byte in the metad... | https://nvd.nist.gov/vuln/detail/CVE-2021-43860 |
224,964 | flatpak | 65cbfac982cb1c83993a9e19aa424daee8e9f042 | https://github.com/flatpak/flatpak | https://github.com/flatpak/flatpak/commit/65cbfac982cb1c83993a9e19aa424daee8e9f042 | Ensure that bundles have metadata on install
If we have a bundle without metadata we wouldn't properly present
the permissions in the transaction. | 0 | flatpak_dir_ensure_bundle_remote (FlatpakDir *self,
GFile *file,
GBytes *extra_gpg_data,
FlatpakDecomposed **out_ref,
char **out_checksum,... | 57199236180630525002318569009544856929 | flatpak-dir.c | 126847826047276531038327785325265722415 | CWE-276 | CVE-2021-43860 | Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.12.3 and 1.10.6, Flatpak doesn't properly validate that the permissions displayed to the user for an app at install time match the actual permissions granted to the app at runtime, in the case that there's a null byte in the metad... | https://nvd.nist.gov/vuln/detail/CVE-2021-43860 |
195,388 | postgres | 160c0258802d10b0600d7671b1bbea55d8e17d45 | https://github.com/postgres/postgres | https://github.com/postgres/postgres/commit/160c0258802d10b0600d7671b1bbea55d8e17d45 | libpq: reject extraneous data after SSL or GSS encryption handshake.
libpq collects up to a bufferload of data whenever it reads data from
the socket. When SSL or GSS encryption is requested during startup,
any additional data received with the server's yes-or-no reply
remained in the buffer, and would be treated as ... | 1 | PQconnectPoll(PGconn *conn)
{
bool reset_connection_state_machine = false;
bool need_new_connection = false;
PGresult *res;
char sebuf[PG_STRERROR_R_BUFLEN];
int optval;
if (conn == NULL)
return PGRES_POLLING_FAILED;
/* Get the new data */
switch (conn->status)
{
/*
* We really shouldn't have... | 145605680477709719969453491383463044279 | fe-connect.c | 157537093140020562394962573075779914657 | CWE-522 | CVE-2021-23222 | A man-in-the-middle attacker can inject false responses to the client's first few queries, despite the use of SSL certificate verification and encryption. | https://nvd.nist.gov/vuln/detail/CVE-2021-23222 |
225,062 | postgres | 160c0258802d10b0600d7671b1bbea55d8e17d45 | https://github.com/postgres/postgres | https://github.com/postgres/postgres/commit/160c0258802d10b0600d7671b1bbea55d8e17d45 | libpq: reject extraneous data after SSL or GSS encryption handshake.
libpq collects up to a bufferload of data whenever it reads data from
the socket. When SSL or GSS encryption is requested during startup,
any additional data received with the server's yes-or-no reply
remained in the buffer, and would be treated as ... | 0 | PQconnectPoll(PGconn *conn)
{
bool reset_connection_state_machine = false;
bool need_new_connection = false;
PGresult *res;
char sebuf[PG_STRERROR_R_BUFLEN];
int optval;
if (conn == NULL)
return PGRES_POLLING_FAILED;
/* Get the new data */
switch (conn->status)
{
/*
* We really shouldn't have... | 278272236215939964516135269002509515902 | fe-connect.c | 18951971958069127999109334280610413251 | CWE-522 | CVE-2021-23222 | A man-in-the-middle attacker can inject false responses to the client's first few queries, despite the use of SSL certificate verification and encryption. | https://nvd.nist.gov/vuln/detail/CVE-2021-23222 |
195,389 | tensorflow | c2b31ff2d3151acb230edc3f5b1832d2c713a9e0 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/c2b31ff2d3151acb230edc3f5b1832d2c713a9e0 | Remove a `DCHECK`-fail, log an error instead.
`DCHECK` in debug mode results in crashes. TensorFlow has had multiple vulnerabilities due to this.
Outside of debug mode, `DCHECK` is a no-op.
A better alternative is to report an error to the log buffer and continue. This should happen both in debug mode and in prod mo... | 1 | bool RepeatedAttrDefEqual(
const protobuf::RepeatedPtrField<OpDef::AttrDef>& a1,
const protobuf::RepeatedPtrField<OpDef::AttrDef>& a2) {
std::unordered_map<string, const OpDef::AttrDef*> a1_set;
for (const OpDef::AttrDef& def : a1) {
DCHECK(a1_set.find(def.name()) == a1_set.end())
<< "AttrDef na... | 228350956694349821922378909162368693155 | op_def_util.cc | 43202597261631718571985626227626810269 | CWE-617 | CVE-2022-23565 | Tensorflow is an Open Source Machine Learning Framework. An attacker can trigger denial of service via assertion failure by altering a `SavedModel` on disk such that `AttrDef`s of some operation are duplicated. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, Tensor... | https://nvd.nist.gov/vuln/detail/CVE-2022-23565 |
225,086 | tensorflow | c2b31ff2d3151acb230edc3f5b1832d2c713a9e0 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/c2b31ff2d3151acb230edc3f5b1832d2c713a9e0 | Remove a `DCHECK`-fail, log an error instead.
`DCHECK` in debug mode results in crashes. TensorFlow has had multiple vulnerabilities due to this.
Outside of debug mode, `DCHECK` is a no-op.
A better alternative is to report an error to the log buffer and continue. This should happen both in debug mode and in prod mo... | 0 | bool RepeatedAttrDefEqual(
const protobuf::RepeatedPtrField<OpDef::AttrDef>& a1,
const protobuf::RepeatedPtrField<OpDef::AttrDef>& a2) {
std::unordered_map<string, const OpDef::AttrDef*> a1_set;
for (const OpDef::AttrDef& def : a1) {
if (a1_set.find(def.name()) != a1_set.end()) {
LOG(ERROR) << "At... | 7221108948147885063916901261116103162 | op_def_util.cc | 99670691263177784698689977477403265008 | CWE-617 | CVE-2022-23565 | Tensorflow is an Open Source Machine Learning Framework. An attacker can trigger denial of service via assertion failure by altering a `SavedModel` on disk such that `AttrDef`s of some operation are duplicated. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, Tensor... | https://nvd.nist.gov/vuln/detail/CVE-2022-23565 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.