idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash string | file_name string | file_hash string | cwe string | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
194,963 | ImageMagick6 | dc070da861a015d3c97488fdcca6063b44d47a7b | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b | https://github.com/ImageMagick/ImageMagick/pull/5034 | 1 | static MagickBooleanType GetEXIFProperty(const Image *image,
const char *property)
{
#define MaxDirectoryStack 16
#define EXIF_DELIMITER "\n"
#define EXIF_NUM_FORMATS 12
#define EXIF_FMT_BYTE 1
#define EXIF_FMT_STRING 2
#define EXIF_FMT_USHORT 3
#define EXIF_FMT_ULONG 4
#define EXIF_FMT_URATIONAL 5
#define EX... | 292096308156704952246887123009503225331 | property.c | 122751008107964047346147343124174074065 | CWE-704 | CVE-2022-32547 | In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other probl... | https://nvd.nist.gov/vuln/detail/CVE-2022-32547 |
217,569 | ImageMagick6 | dc070da861a015d3c97488fdcca6063b44d47a7b | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b | https://github.com/ImageMagick/ImageMagick/pull/5034 | 0 | static MagickBooleanType GetEXIFProperty(const Image *image,
const char *property)
{
#define MaxDirectoryStack 16
#define EXIF_DELIMITER "\n"
#define EXIF_NUM_FORMATS 12
#define EXIF_FMT_BYTE 1
#define EXIF_FMT_STRING 2
#define EXIF_FMT_USHORT 3
#define EXIF_FMT_ULONG 4
#define EXIF_FMT_URATIONAL 5
#define EX... | 75422468811560646183620950160304672170 | property.c | 320426917520707901134127411021604962567 | CWE-704 | CVE-2022-32547 | In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other probl... | https://nvd.nist.gov/vuln/detail/CVE-2022-32547 |
194,989 | ImageMagick6 | 450949ed017f009b399c937cf362f0058eacc5fa | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa | Pull request: https://github.com/ImageMagick/ImageMagick/pull/4963 | 1 | static MagickBooleanType ReadPSDChannelPixels(Image *image,
const size_t channels,const ssize_t row,const ssize_t type,
const unsigned char *pixels,ExceptionInfo *exception)
{
Quantum
pixel;
const unsigned char
*p;
IndexPacket
*indexes;
PixelPacket
*q;
ssize_t
x;
size_t
pack... | 50584299779312396054491404176852470969 | psd.c | 159316916509494023086155162326374999236 | CWE-190 | CVE-2022-32545 | A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior. | https://nvd.nist.gov/vuln/detail/CVE-2022-32545 |
218,785 | ImageMagick6 | 450949ed017f009b399c937cf362f0058eacc5fa | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa | Pull request: https://github.com/ImageMagick/ImageMagick/pull/4963 | 0 | static MagickBooleanType ReadPSDChannelPixels(Image *image,
const size_t channels,const ssize_t row,const ssize_t type,
const unsigned char *pixels,ExceptionInfo *exception)
{
Quantum
pixel;
const unsigned char
*p;
IndexPacket
*indexes;
PixelPacket
*q;
ssize_t
x;
size_t
pack... | 177518249272594340059836567736761123364 | psd.c | 226732625250511916284298083592366716300 | CWE-190 | CVE-2022-32545 | A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior. | https://nvd.nist.gov/vuln/detail/CVE-2022-32545 |
194,996 | tensorflow | 4f38b1ac8e42727e18a2f0bde06d3bee8e77b250 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/4f38b1ac8e42727e18a2f0bde06d3bee8e77b250 | Prevent null dereference read in `GetInitOp`.
We have a map of maps. We test that the key exists in the first map but then we don't have any validation that this also means the second map has the needed key. In the scenarios where this is not the case, we'll dereference a nullptr, if we don't have this check
PiperOri... | 1 | Status GetInitOp(const string& export_dir, const MetaGraphDef& meta_graph_def,
string* init_op_name) {
const auto& sig_def_map = meta_graph_def.signature_def();
const auto& init_op_sig_it =
meta_graph_def.signature_def().find(kSavedModelInitOpSignatureKey);
if (init_op_sig_it != sig_def_map... | 90320046309155279319769139363770698236 | loader_util.cc | 223638670651747648145854147173893848422 | CWE-476 | CVE-2022-23577 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `GetInitOp` is vulnerable to a crash caused by dereferencing a null pointer. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also aff... | https://nvd.nist.gov/vuln/detail/CVE-2022-23577 |
218,933 | tensorflow | 4f38b1ac8e42727e18a2f0bde06d3bee8e77b250 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/4f38b1ac8e42727e18a2f0bde06d3bee8e77b250 | Prevent null dereference read in `GetInitOp`.
We have a map of maps. We test that the key exists in the first map but then we don't have any validation that this also means the second map has the needed key. In the scenarios where this is not the case, we'll dereference a nullptr, if we don't have this check
PiperOri... | 0 | Status GetInitOp(const string& export_dir, const MetaGraphDef& meta_graph_def,
string* init_op_name) {
const auto& sig_def_map = meta_graph_def.signature_def();
const auto& init_op_sig_it =
meta_graph_def.signature_def().find(kSavedModelInitOpSignatureKey);
if (init_op_sig_it != sig_def_map... | 120370294428908534368713689048437773064 | loader_util.cc | 225205642200693417259460288987767726126 | CWE-476 | CVE-2022-23577 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `GetInitOp` is vulnerable to a crash caused by dereferencing a null pointer. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also aff... | https://nvd.nist.gov/vuln/detail/CVE-2022-23577 |
195,017 | gpac | ad18ece95fa064efc0995c4ab2c985f77fb166ec | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/ad18ece95fa064efc0995c4ab2c985f77fb166ec | fixed #1904 | 1 | u32 GetHintFormat(GF_TrackBox *trak)
{
GF_HintMediaHeaderBox *hmhd = (GF_HintMediaHeaderBox *)trak->Media->information->InfoHeader;
if (hmhd->type != GF_ISOM_BOX_TYPE_HMHD)
return 0;
if (!hmhd || !hmhd->subType) {
GF_Box *a = (GF_Box *)gf_list_get(trak->Media->information->sampleTable->SampleDescription->chil... | 91218268849686441388880855658517990203 | hint_track.c | 60176895274654779679144452624639678766 | CWE-476 | CVE-2021-40576 | The binary MP4Box in Gpac 1.0.1 has a null pointer dereference vulnerability in the gf_isom_get_payt_count function in hint_track.c, which allows attackers to cause a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2021-40576 |
219,912 | gpac | ad18ece95fa064efc0995c4ab2c985f77fb166ec | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/ad18ece95fa064efc0995c4ab2c985f77fb166ec | fixed #1904 | 0 | u32 GetHintFormat(GF_TrackBox *trak)
{
GF_HintMediaHeaderBox *hmhd = (GF_HintMediaHeaderBox *)trak->Media->information->InfoHeader;
if (!hmhd || (hmhd->type != GF_ISOM_BOX_TYPE_HMHD))
return 0;
if (!hmhd || !hmhd->subType) {
GF_Box *a = (GF_Box *)gf_list_get(trak->Media->information->sampleTable->SampleDescri... | 240641657114030682383886931707833033482 | hint_track.c | 28976036322661795345788739460485147148 | CWE-476 | CVE-2021-40576 | The binary MP4Box in Gpac 1.0.1 has a null pointer dereference vulnerability in the gf_isom_get_payt_count function in hint_track.c, which allows attackers to cause a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2021-40576 |
195,026 | linux | ab0fc21bc7105b54bafd85bd8b82742f9e68898a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ab0fc21bc7105b54bafd85bd8b82742f9e68898a | Revert "NFSv4: Handle the special Linux file open access mode"
This reverts commit 44942b4e457beda00981f616402a1a791e8c616e.
After secondly opening a file with O_ACCMODE|O_DIRECT flags,
nfs4_valid_open_stateid() will dereference NULL nfs4_state when lseek().
Reproducer:
1. mount -t nfs -o vers=4.2 $server_ip:/ /mn... | 1 | nfs4_file_open(struct inode *inode, struct file *filp)
{
struct nfs_open_context *ctx;
struct dentry *dentry = file_dentry(filp);
struct dentry *parent = NULL;
struct inode *dir;
unsigned openflags = filp->f_flags;
struct iattr attr;
int err;
/*
* If no cached dentry exists or if it's negative, NFSv4 handled... | 67846125552854891508125900978071958871 | nfs4file.c | 109456154040292488452120321326967957719 | CWE-909 | CVE-2022-24448 | An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descripto... | https://nvd.nist.gov/vuln/detail/CVE-2022-24448 |
220,100 | linux | ab0fc21bc7105b54bafd85bd8b82742f9e68898a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ab0fc21bc7105b54bafd85bd8b82742f9e68898a | Revert "NFSv4: Handle the special Linux file open access mode"
This reverts commit 44942b4e457beda00981f616402a1a791e8c616e.
After secondly opening a file with O_ACCMODE|O_DIRECT flags,
nfs4_valid_open_stateid() will dereference NULL nfs4_state when lseek().
Reproducer:
1. mount -t nfs -o vers=4.2 $server_ip:/ /mn... | 0 | nfs4_file_open(struct inode *inode, struct file *filp)
{
struct nfs_open_context *ctx;
struct dentry *dentry = file_dentry(filp);
struct dentry *parent = NULL;
struct inode *dir;
unsigned openflags = filp->f_flags;
struct iattr attr;
int err;
/*
* If no cached dentry exists or if it's negative, NFSv4 handled... | 272987829557105540879962051296017178836 | nfs4file.c | 19160442996144037090827134285929888626 | CWE-909 | CVE-2022-24448 | An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descripto... | https://nvd.nist.gov/vuln/detail/CVE-2022-24448 |
195,038 | mruby | 27d1e0132a0804581dca28df042e7047fd27eaa8 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/27d1e0132a0804581dca28df042e7047fd27eaa8 | array.c: fix `mrb_ary_shift_m` initialization bug.
The `ARY_PTR` and `ARY_LEN` may be modified in `mrb_get_args`. | 1 | mrb_ary_shift_m(mrb_state *mrb, mrb_value self)
{
struct RArray *a = mrb_ary_ptr(self);
mrb_int len = ARY_LEN(a);
mrb_int n;
mrb_value val;
if (mrb_get_args(mrb, "|i", &n) == 0) {
return mrb_ary_shift(mrb, self);
};
ary_modify_check(mrb, a);
if (len == 0 || n == 0) return mrb_ary_new(mrb);
if (n ... | 88987793594626442814152795226896894437 | array.c | 131985777969528154957566525214352537878 | CWE-476 | CVE-2021-4188 | mruby is vulnerable to NULL Pointer Dereference | https://nvd.nist.gov/vuln/detail/CVE-2021-4188 |
220,442 | mruby | 27d1e0132a0804581dca28df042e7047fd27eaa8 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/27d1e0132a0804581dca28df042e7047fd27eaa8 | array.c: fix `mrb_ary_shift_m` initialization bug.
The `ARY_PTR` and `ARY_LEN` may be modified in `mrb_get_args`. | 0 | mrb_ary_shift_m(mrb_state *mrb, mrb_value self)
{
mrb_int n;
if (mrb_get_args(mrb, "|i", &n) == 0) {
return mrb_ary_shift(mrb, self);
}
struct RArray *a = mrb_ary_ptr(self);
mrb_int len = ARY_LEN(a);
mrb_value val;
ary_modify_check(mrb, a);
if (len == 0 || n == 0) return mrb_ary_new(mrb);
if (n... | 336824346603495353101799104649854425750 | array.c | 295526445825727607536544634773604768998 | CWE-476 | CVE-2021-4188 | mruby is vulnerable to NULL Pointer Dereference | https://nvd.nist.gov/vuln/detail/CVE-2021-4188 |
195,039 | tensorflow | e7f497570abb6b4ae5af4970620cd880e4c0c904 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/e7f497570abb6b4ae5af4970620cd880e4c0c904 | Fix segfault on OOM in Conv2D.
PiperOrigin-RevId: 404655317
Change-Id: I33588dbd3f5d0fef980e3c908bf5515a9ee09ce7 | 1 | void operator()(OpKernelContext* ctx, const Tensor& input,
const Tensor& filter, int row_stride, int col_stride,
int row_dilation, int col_dilation, const Padding& padding,
const std::vector<int64_t>& explicit_paddings, Tensor* output,
TensorForm... | 257618220779157714024325768166416151732 | conv_ops.cc | 252300068611383622428481854806618645318 | CWE-354 | CVE-2021-41206 | TensorFlow is an open source platform for machine learning. In affected versions several TensorFlow operations are missing validation for the shapes of the tensor arguments involved in the call. Depending on the API, this can result in undefined behavior and segfault or `CHECK`-fail related crashes but in some scenario... | https://nvd.nist.gov/vuln/detail/CVE-2021-41206 |
220,449 | tensorflow | e7f497570abb6b4ae5af4970620cd880e4c0c904 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/e7f497570abb6b4ae5af4970620cd880e4c0c904 | Fix segfault on OOM in Conv2D.
PiperOrigin-RevId: 404655317
Change-Id: I33588dbd3f5d0fef980e3c908bf5515a9ee09ce7 | 0 | void operator()(OpKernelContext* ctx, const Tensor& input,
const Tensor& filter, int row_stride, int col_stride,
int row_dilation, int col_dilation, const Padding& padding,
const std::vector<int64_t>& explicit_paddings, Tensor* output,
TensorForm... | 52476148530312265483336987277784785500 | conv_ops.cc | 162425470101834995272420301327894414264 | CWE-354 | CVE-2021-41206 | TensorFlow is an open source platform for machine learning. In affected versions several TensorFlow operations are missing validation for the shapes of the tensor arguments involved in the call. Depending on the API, this can result in undefined behavior and segfault or `CHECK`-fail related crashes but in some scenario... | https://nvd.nist.gov/vuln/detail/CVE-2021-41206 |
195,055 | tensorflow | 2b7100d6cdff36aa21010a82269bc05a6d1cc74a | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/2b7100d6cdff36aa21010a82269bc05a6d1cc74a | Cleanup and remove duplicate validation in `SparseCount`.
We have valdiation that is duplicated, checking different conditions, in different formats and failing to capture all cases. This should fix all the previous bugs.
PiperOrigin-RevId: 414886981
Change-Id: Ibf0bba0beb057b76d505324bb9487565daf95f01 | 1 | void Compute(OpKernelContext* context) override {
const Tensor& indices = context->input(0);
const Tensor& values = context->input(1);
const Tensor& shape = context->input(2);
const Tensor& weights = context->input(3);
bool use_weights = weights.NumElements() > 0;
OP_REQUIRES(context, TensorS... | 115744370413617881150207979427400512016 | count_ops.cc | 290832582717285970119064032382621433475 | CWE-787 | CVE-2022-21740 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCountSparseOutput` is vulnerable to a heap overflow. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still i... | https://nvd.nist.gov/vuln/detail/CVE-2022-21740 |
220,804 | tensorflow | 2b7100d6cdff36aa21010a82269bc05a6d1cc74a | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/2b7100d6cdff36aa21010a82269bc05a6d1cc74a | Cleanup and remove duplicate validation in `SparseCount`.
We have valdiation that is duplicated, checking different conditions, in different formats and failing to capture all cases. This should fix all the previous bugs.
PiperOrigin-RevId: 414886981
Change-Id: Ibf0bba0beb057b76d505324bb9487565daf95f01 | 0 | void Compute(OpKernelContext* context) override {
const Tensor& splits = context->input(0);
const Tensor& values = context->input(1);
const Tensor& weights = context->input(2);
bool use_weights = weights.NumElements() > 0;
bool is_1d = false;
if (use_weights) {
OP_REQUIRES(
co... | 321329284400462468105618833406255634390 | count_ops.cc | 221778566959720819887290009238961995785 | CWE-787 | CVE-2022-21740 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCountSparseOutput` is vulnerable to a heap overflow. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still i... | https://nvd.nist.gov/vuln/detail/CVE-2022-21740 |
195,056 | tensorflow | 8c6f391a2282684a25cbfec7687bd5d35261a209 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/8c6f391a2282684a25cbfec7687bd5d35261a209 | [lite] Add check for bias_size is zero to avoid division by zero. This shouldn't happen for properly converted models. Just safety check
PiperOrigin-RevId: 416383645
Change-Id: If8e508bf696ae8ecfb927e69c139a8ccf7fe60cb | 1 | inline void BiasAndClamp(float clamp_min, float clamp_max, int bias_size,
const float* bias_data, int array_size,
float* array_data) {
// Note: see b/132215220: in May 2019 we thought it would be OK to replace
// this with the Eigen one-liner:
// return (array.c... | 154263320578941255259441922880599149557 | common.h | 11373796702176609664888229687660280569 | CWE-369 | CVE-2022-23557 | Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would trigger a division by zero in `BiasAndClamp` implementation. There is no check that the `bias_size` is non zero. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1,... | https://nvd.nist.gov/vuln/detail/CVE-2022-23557 |
220,841 | tensorflow | 8c6f391a2282684a25cbfec7687bd5d35261a209 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/8c6f391a2282684a25cbfec7687bd5d35261a209 | [lite] Add check for bias_size is zero to avoid division by zero. This shouldn't happen for properly converted models. Just safety check
PiperOrigin-RevId: 416383645
Change-Id: If8e508bf696ae8ecfb927e69c139a8ccf7fe60cb | 0 | inline void BiasAndClamp(float clamp_min, float clamp_max, int bias_size,
const float* bias_data, int array_size,
float* array_data) {
if (bias_size == 0) return;
// Note: see b/132215220: in May 2019 we thought it would be OK to replace
// this with the Eigen one... | 163406073569204971648641083480315438791 | common.h | 206010119069068373550820723284960883967 | CWE-369 | CVE-2022-23557 | Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would trigger a division by zero in `BiasAndClamp` implementation. There is no check that the `bias_size` is non zero. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1,... | https://nvd.nist.gov/vuln/detail/CVE-2022-23557 |
195,074 | gpac | a69b567b8c95c72f9560c873c5ab348be058f340 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/a69b567b8c95c72f9560c873c5ab348be058f340 | fixed #1895 | 1 | GF_AV1Config *gf_odf_av1_cfg_read_bs_size(GF_BitStream *bs, u32 size)
{
#ifndef GPAC_DISABLE_AV_PARSERS
AV1State state;
u8 reserved;
GF_AV1Config *cfg;
if (!size) size = (u32) gf_bs_available(bs);
if (!size) return NULL;
cfg = gf_odf_av1_cfg_new();
gf_av1_init_state(&state);
state.config = cfg;
cfg->marker ... | 270972574846681061752900592460657064315 | descriptors.c | 100253523943266503998746709370742625478 | CWE-415 | CVE-2021-40571 | The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the ilst_box_read function in box_code_apple.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges. | https://nvd.nist.gov/vuln/detail/CVE-2021-40571 |
221,160 | gpac | a69b567b8c95c72f9560c873c5ab348be058f340 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/a69b567b8c95c72f9560c873c5ab348be058f340 | fixed #1895 | 0 | GF_AV1Config *gf_odf_av1_cfg_read_bs_size(GF_BitStream *bs, u32 size)
{
#ifndef GPAC_DISABLE_AV_PARSERS
AV1State state;
u8 reserved;
GF_AV1Config *cfg;
if (!size) size = (u32) gf_bs_available(bs);
if (!size) return NULL;
cfg = gf_odf_av1_cfg_new();
gf_av1_init_state(&state);
state.config = cfg;
cfg->marker ... | 161782515383812350901831460771265303089 | descriptors.c | 86476492964393375980272696403064975409 | CWE-415 | CVE-2021-40571 | The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the ilst_box_read function in box_code_apple.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges. | https://nvd.nist.gov/vuln/detail/CVE-2021-40571 |
195,082 | linux | c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc | KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)
If L1 disables VMLOAD/VMSAVE intercepts, and doesn't enable
Virtual VMLOAD/VMSAVE (currently not supported for the nested hypervisor),
then VMLOAD/VMSAVE must operate on the L1 physical memory, which is only
possible by making L0 intercept these ins... | 1 | void recalc_intercepts(struct vcpu_svm *svm)
{
struct vmcb_control_area *c, *h, *g;
unsigned int i;
vmcb_mark_dirty(svm->vmcb, VMCB_INTERCEPTS);
if (!is_guest_mode(&svm->vcpu))
return;
c = &svm->vmcb->control;
h = &svm->vmcb01.ptr->control;
g = &svm->nested.ctl;
for (i = 0; i < MAX_INTERCEPT; i++)
c->in... | 308018010909685377463219146239861290533 | None | CWE-862 | CVE-2021-3656 | A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable bot... | https://nvd.nist.gov/vuln/detail/CVE-2021-3656 | |
221,413 | linux | c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc | KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)
If L1 disables VMLOAD/VMSAVE intercepts, and doesn't enable
Virtual VMLOAD/VMSAVE (currently not supported for the nested hypervisor),
then VMLOAD/VMSAVE must operate on the L1 physical memory, which is only
possible by making L0 intercept these ins... | 0 | void recalc_intercepts(struct vcpu_svm *svm)
{
struct vmcb_control_area *c, *h, *g;
unsigned int i;
vmcb_mark_dirty(svm->vmcb, VMCB_INTERCEPTS);
if (!is_guest_mode(&svm->vcpu))
return;
c = &svm->vmcb->control;
h = &svm->vmcb01.ptr->control;
g = &svm->nested.ctl;
for (i = 0; i < MAX_INTERCEPT; i++)
c->in... | 61346983903340748153155985789359366401 | None | CWE-862 | CVE-2021-3656 | A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable bot... | https://nvd.nist.gov/vuln/detail/CVE-2021-3656 | |
195,083 | tensorflow | 5b491cd5e41ad63735161cec9c2a568172c8b6a3 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/5b491cd5e41ad63735161cec9c2a568172c8b6a3 | Validate `proto.dtype()` before calling `set_dtype()`.
This prevents a `DCHECK`-fail when the proto contains an invalid dtype for a tensor shape with 0 elements or for an incomplete tensor shape.
PiperOrigin-RevId: 408369083
Change-Id: Ia21a3e3d62a90d642a4561f08f3b543e5ad00c46 | 1 | bool Tensor::FromProto(Allocator* a, const TensorProto& proto) {
CHECK_NOTNULL(a);
TensorBuffer* p = nullptr;
if (!TensorShape::IsValid(proto.tensor_shape())) return false;
if (proto.dtype() == DT_INVALID) return false;
TensorShape shape(proto.tensor_shape());
const int64_t N = shape.num_elements();
if (N... | 112719252128622113589892906952570683457 | tensor.cc | 289613009517546867193769314060658742037 | CWE-617 | CVE-2022-23571 | Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments, if the tensors have an invalid `dtype` and 0 elements or an invalid shape. This allows attackers to cause d... | https://nvd.nist.gov/vuln/detail/CVE-2022-23571 |
221,428 | tensorflow | 5b491cd5e41ad63735161cec9c2a568172c8b6a3 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/5b491cd5e41ad63735161cec9c2a568172c8b6a3 | Validate `proto.dtype()` before calling `set_dtype()`.
This prevents a `DCHECK`-fail when the proto contains an invalid dtype for a tensor shape with 0 elements or for an incomplete tensor shape.
PiperOrigin-RevId: 408369083
Change-Id: Ia21a3e3d62a90d642a4561f08f3b543e5ad00c46 | 0 | bool Tensor::FromProto(Allocator* a, const TensorProto& proto) {
CHECK_NOTNULL(a);
TensorBuffer* p = nullptr;
if (!TensorShape::IsValid(proto.tensor_shape())) return false;
if (proto.dtype() == DT_INVALID) return false;
TensorShape shape(proto.tensor_shape());
const int64_t N = shape.num_elements();
if (N... | 12020279702191708342972381802829194549 | tensor.cc | 303884711858139014412460575672580480868 | CWE-617 | CVE-2022-23571 | Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments, if the tensors have an invalid `dtype` and 0 elements or an invalid shape. This allows attackers to cause d... | https://nvd.nist.gov/vuln/detail/CVE-2022-23571 |
195,091 | tensorflow | 35f0fabb4c178253a964d7aabdbb15c6a398b69a | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/35f0fabb4c178253a964d7aabdbb15c6a398b69a | Avoid Segfault for scalar shapes.
Calling tensor::FromElementsOp with an empty vector of elements and no type
causes a segfault. We need to let the FromElementsOp know which scalar type it
should have.
Also add back the DynamicBroadcastInDimOp canonicalization patterns, which
previously prevented this bug from happeni... | 1 | llvm::Optional<Value> simplifyBroadcast(ShapeComponentAnalysis& analysis,
ValueRange shapes, Location loc,
OpBuilder* builder) {
// First find the input shape with the largest rank.
SmallVector<ArrayRef<ShapeComponentAnalysis::SymbolicE... | 84683486121098934971147990908524528886 | tf_cpurt_symbolic_shape_optimization.cc | 183860206963562900623001205261417288221 | CWE-754 | CVE-2022-23593 | Tensorflow is an Open Source Machine Learning Framework. The `simplifyBroadcast` function in the MLIR-TFRT infrastructure in TensorFlow is vulnerable to a segfault (hence, denial of service), if called with scalar shapes. If all shapes are scalar, then `maxRank` is 0, so we build an empty `SmallVector`. The fix will be... | https://nvd.nist.gov/vuln/detail/CVE-2022-23593 |
221,631 | tensorflow | 35f0fabb4c178253a964d7aabdbb15c6a398b69a | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/35f0fabb4c178253a964d7aabdbb15c6a398b69a | Avoid Segfault for scalar shapes.
Calling tensor::FromElementsOp with an empty vector of elements and no type
causes a segfault. We need to let the FromElementsOp know which scalar type it
should have.
Also add back the DynamicBroadcastInDimOp canonicalization patterns, which
previously prevented this bug from happeni... | 0 | llvm::Optional<Value> simplifyBroadcast(ShapeComponentAnalysis& analysis,
ValueRange shapes, Location loc,
OpBuilder* builder) {
// First find the input shape with the largest rank.
SmallVector<ArrayRef<ShapeComponentAnalysis::SymbolicE... | 131837408517580503230068988683463768929 | tf_cpurt_symbolic_shape_optimization.cc | 61127670286277963749447708912499557476 | CWE-754 | CVE-2022-23593 | Tensorflow is an Open Source Machine Learning Framework. The `simplifyBroadcast` function in the MLIR-TFRT infrastructure in TensorFlow is vulnerable to a segfault (hence, denial of service), if called with scalar shapes. If all shapes are scalar, then `maxRank` is 0, so we build an empty `SmallVector`. The fix will be... | https://nvd.nist.gov/vuln/detail/CVE-2022-23593 |
195,230 | pjproject | f74c1fc22b760d2a24369aa72c74c4a9ab985859 | https://github.com/pjsip/pjproject | https://github.com/pjsip/pjproject/commit/f74c1fc22b760d2a24369aa72c74c4a9ab985859 | Merge pull request from GHSA-r374-qrwv-86hh | 1 | void pjmedia_rtcp_xr_rx_rtcp_xr( pjmedia_rtcp_xr_session *sess,
const void *pkt,
pj_size_t size)
{
const pjmedia_rtcp_xr_pkt *rtcp_xr = (pjmedia_rtcp_xr_pkt*) pkt;
const pjmedia_rtcp_xr_rb_rr_time *rb_rr_time = NULL;
const pjmedia_rtcp_xr_rb_dlrr *rb_dlrr = NULL;
const pjmedia_rtcp_... | 128531615202269817130665554219664776865 | rtcp_xr.c | 114410540091951766279707779044798368853 | CWE-125 | CVE-2021-43845 | PJSIP is a free and open source multimedia communication library. In version 2.11.1 and prior, if incoming RTCP XR message contain block, the data field is not checked against the received packet size, potentially resulting in an out-of-bound read access. This affects all users that use PJMEDIA and RTCP XR. A malicious... | https://nvd.nist.gov/vuln/detail/CVE-2021-43845 |
222,737 | pjproject | f74c1fc22b760d2a24369aa72c74c4a9ab985859 | https://github.com/pjsip/pjproject | https://github.com/pjsip/pjproject/commit/f74c1fc22b760d2a24369aa72c74c4a9ab985859 | Merge pull request from GHSA-r374-qrwv-86hh | 0 | void pjmedia_rtcp_xr_rx_rtcp_xr( pjmedia_rtcp_xr_session *sess,
const void *pkt,
pj_size_t size)
{
const pjmedia_rtcp_xr_pkt *rtcp_xr = (pjmedia_rtcp_xr_pkt*) pkt;
const pjmedia_rtcp_xr_rb_rr_time *rb_rr_time = NULL;
const pjmedia_rtcp_xr_rb_dlrr *rb_dlrr = NULL;
const pjmedia_rtcp_... | 134123814969944330757535232446891920936 | rtcp_xr.c | 238632209992792964107720594546671940595 | CWE-125 | CVE-2021-43845 | PJSIP is a free and open source multimedia communication library. In version 2.11.1 and prior, if incoming RTCP XR message contain block, the data field is not checked against the received packet size, potentially resulting in an out-of-bound read access. This affects all users that use PJMEDIA and RTCP XR. A malicious... | https://nvd.nist.gov/vuln/detail/CVE-2021-43845 |
195,231 | gpac | 893fb99b606eebfae46cde151846a980e689039b | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/893fb99b606eebfae46cde151846a980e689039b | fixed #1902 | 1 | s32 gf_avc_parse_nalu(GF_BitStream *bs, AVCState *avc)
{
u8 idr_flag;
s32 slice, ret;
u32 nal_hdr;
AVCSliceInfo n_state;
gf_bs_enable_emulation_byte_removal(bs, GF_TRUE);
nal_hdr = gf_bs_read_u8(bs);
slice = 0;
memcpy(&n_state, &avc->s_info, sizeof(AVCSliceInfo));
avc->last_nal_type_parsed = n_state.nal_uni... | 99100226875075764129164909998725433232 | av_parsers.c | 168517587328341017594269375399465893964 | CWE-476 | CVE-2021-40565 | A Segmentation fault caused by a null pointer dereference vulnerability exists in Gpac through 1.0.1 via the gf_avc_parse_nalu function in av_parsers.c when using mp4box, which causes a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2021-40565 |
222,739 | gpac | 893fb99b606eebfae46cde151846a980e689039b | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/893fb99b606eebfae46cde151846a980e689039b | fixed #1902 | 0 | s32 gf_avc_parse_nalu(GF_BitStream *bs, AVCState *avc)
{
u8 idr_flag;
s32 slice, ret;
u32 nal_hdr;
AVCSliceInfo n_state;
gf_bs_enable_emulation_byte_removal(bs, GF_TRUE);
nal_hdr = gf_bs_read_u8(bs);
slice = 0;
memcpy(&n_state, &avc->s_info, sizeof(AVCSliceInfo));
avc->last_nal_type_parsed = n_state.nal_uni... | 151148020238252563376772611575796474624 | av_parsers.c | 336095072032702615903888752582747164805 | CWE-476 | CVE-2021-40565 | A Segmentation fault caused by a null pointer dereference vulnerability exists in Gpac through 1.0.1 via the gf_avc_parse_nalu function in av_parsers.c when using mp4box, which causes a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2021-40565 |
195,237 | ImageMagick | f221ea0fa3171f0f4fdf74ac9d81b203b9534c23 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23 | Fixes #4985: 4e+26 is outside the range of representable values of type 'unsigned long' at coders/pcl.c:299 (#4986)
* fix Division by zero in XMenuWidget() of MagickCore/widget.c
* Fix memory leak in AnimateImageCommand() of MagickWand/animate.c and DisplayImageCommand() of MagickWand/display.c
* fix Division by zer... | 1 | static Image *ReadPCLImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define CropBox "CropBox"
#define DeviceCMYK "DeviceCMYK"
#define MediaBox "MediaBox"
#define RenderPCLText " Rendering PCL... "
char
command[MagickPathExtent],
*density,
filename[MagickPathExtent],
geometry[Magi... | 164108098598115354275502589345492195560 | pcl.c | 226900089914426038554396055314138187051 | CWE-190 | CVE-2022-32546 | A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior. | https://nvd.nist.gov/vuln/detail/CVE-2022-32546 |
223,089 | ImageMagick | f221ea0fa3171f0f4fdf74ac9d81b203b9534c23 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f221ea0fa3171f0f4fdf74ac9d81b203b9534c23 | Fixes #4985: 4e+26 is outside the range of representable values of type 'unsigned long' at coders/pcl.c:299 (#4986)
* fix Division by zero in XMenuWidget() of MagickCore/widget.c
* Fix memory leak in AnimateImageCommand() of MagickWand/animate.c and DisplayImageCommand() of MagickWand/display.c
* fix Division by zer... | 0 | static Image *ReadPCLImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define CropBox "CropBox"
#define DeviceCMYK "DeviceCMYK"
#define MediaBox "MediaBox"
#define RenderPCLText " Rendering PCL... "
char
command[MagickPathExtent],
*density,
filename[MagickPathExtent],
geometry[Magi... | 19106273782202991773902274267597206156 | pcl.c | 107050694639473008713363285641232916868 | CWE-190 | CVE-2022-32546 | A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior. | https://nvd.nist.gov/vuln/detail/CVE-2022-32546 |
195,264 | pcre2 | d4fa336fbcc388f89095b184ba6d99422cfc676c | https://github.com/PCRE2Project/pcre2 | https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c | Fix incorrect value reading in JIT. | 1 | static void compile_xclass_matchingpath(compiler_common *common, PCRE2_SPTR cc, jump_list **backtracks)
{
DEFINE_COMPILER;
jump_list *found = NULL;
jump_list **list = (cc[0] & XCL_NOT) == 0 ? &found : backtracks;
sljit_uw c, charoffset, max = 256, min = READ_CHAR_MAX;
struct sljit_jump *jump = NULL;
PCRE2_SPTR ccbegin;... | 183419698766008283102134937176756315954 | pcre2_jit_compile.c | 284265016287060690142505784626516203619 | CWE-125 | CVE-2022-1586 | An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching with... | https://nvd.nist.gov/vuln/detail/CVE-2022-1586 |
223,368 | pcre2 | d4fa336fbcc388f89095b184ba6d99422cfc676c | https://github.com/PCRE2Project/pcre2 | https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c | Fix incorrect value reading in JIT. | 0 | static void compile_xclass_matchingpath(compiler_common *common, PCRE2_SPTR cc, jump_list **backtracks)
{
DEFINE_COMPILER;
jump_list *found = NULL;
jump_list **list = (cc[0] & XCL_NOT) == 0 ? &found : backtracks;
sljit_uw c, charoffset, max = 256, min = READ_CHAR_MAX;
struct sljit_jump *jump = NULL;
PCRE2_SPTR ccbegin;... | 144276531294134211562638848702422655084 | pcre2_jit_compile.c | 52374969195278947710795935639555031915 | CWE-125 | CVE-2022-1586 | An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching with... | https://nvd.nist.gov/vuln/detail/CVE-2022-1586 |
195,291 | tensorflow | ef1d027be116f25e25bb94a60da491c2cf55bd0b | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/ef1d027be116f25e25bb94a60da491c2cf55bd0b | Prevent copying uninitialized data in `AssignOp`.
This prevents harder to debug undefined behaviors that cannot be traced back to the original tensor after assignments occur earlier in the graph execution. Several of these undefined behaviors are just reference bindings to null pointers, which are caught when running ... | 1 | void Compute(OpKernelContext* context) override {
const Tensor& rhs = context->input(1);
// We always return the input ref.
context->forward_ref_input_to_ref_output(0, 0);
// We can't always know how this value will be used downstream, so make
// conservative assumptions in specifying constraint... | 110563830933859876998490806365273446744 | assign_op.h | 69919930869774703131816695670485389180 | CWE-908 | CVE-2022-23573 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `AssignOp` can result in copying uninitialized data to a new tensor. This later results in undefined behavior. The implementation has a check that the left hand side of the assignment is initialized (to minimize number of allocations), but d... | https://nvd.nist.gov/vuln/detail/CVE-2022-23573 |
224,153 | tensorflow | ef1d027be116f25e25bb94a60da491c2cf55bd0b | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/ef1d027be116f25e25bb94a60da491c2cf55bd0b | Prevent copying uninitialized data in `AssignOp`.
This prevents harder to debug undefined behaviors that cannot be traced back to the original tensor after assignments occur earlier in the graph execution. Several of these undefined behaviors are just reference bindings to null pointers, which are caught when running ... | 0 | void Compute(OpKernelContext* context) override {
const Tensor& rhs = context->input(1);
// We always return the input ref.
context->forward_ref_input_to_ref_output(0, 0);
// Prevent copying uninitialized data, to solve harder to debug undefined
// behaviors that cannot be traced back to the ori... | 305037740106398797533289727050001288809 | assign_op.h | 227740622376075800348272805227748641889 | CWE-908 | CVE-2022-23573 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `AssignOp` can result in copying uninitialized data to a new tensor. This later results in undefined behavior. The implementation has a check that the left hand side of the assignment is initialized (to minimize number of allocations), but d... | https://nvd.nist.gov/vuln/detail/CVE-2022-23573 |
195,293 | mruby | ae3c99767a27f5c6c584162e2adc6a5d0eb2c54e | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/ae3c99767a27f5c6c584162e2adc6a5d0eb2c54e | codegen.c: fixed a bug in hash code generation with `!val`. | 1 | gen_hash(codegen_scope *s, node *tree, int val, int limit)
{
int slimit = GEN_VAL_STACK_MAX;
if (cursp() >= GEN_LIT_ARY_MAX) slimit = INT16_MAX;
int len = 0;
mrb_bool update = FALSE;
while (tree) {
if (nint(tree->car->car->car) == NODE_KW_REST_ARGS) {
if (len > 0) {
pop_n(len*2);
if... | 193019522040384116683756187518117428466 | codegen.c | 187346573288549092337421927147361320618 | CWE-476 | CVE-2022-0481 | NULL Pointer Dereference in Homebrew mruby prior to 3.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-0481 |
224,154 | mruby | ae3c99767a27f5c6c584162e2adc6a5d0eb2c54e | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/ae3c99767a27f5c6c584162e2adc6a5d0eb2c54e | codegen.c: fixed a bug in hash code generation with `!val`. | 0 | gen_hash(codegen_scope *s, node *tree, int val, int limit)
{
int slimit = GEN_VAL_STACK_MAX;
if (cursp() >= GEN_LIT_ARY_MAX) slimit = INT16_MAX;
int len = 0;
mrb_bool update = FALSE;
while (tree) {
if (nint(tree->car->car->car) == NODE_KW_REST_ARGS) {
if (val && len > 0) {
pop_n(len*2);
... | 86249756338106133378324988596644701448 | None | CWE-476 | CVE-2022-0481 | NULL Pointer Dereference in Homebrew mruby prior to 3.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-0481 | |
195,294 | tensorflow | f57315566d7094f322b784947093406c2aea0d7d | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/f57315566d7094f322b784947093406c2aea0d7d | Add a check for Key being scalar tensor for MapStage and OrderedMapStage ops.
According to documentation[1][2], key must be int64 value, but this wasn't enforced and the ops would fail with check failure for non-scalar key value.
[1]https://www.tensorflow.org/api_docs/cc/class/tensorflow/ops/ordered-map-stage
[2]http... | 1 | void Compute(OpKernelContext* ctx) override {
StagingMap<Ordered>* map = nullptr;
OP_REQUIRES_OK(ctx, GetStagingMap(ctx, def(), &map));
core::ScopedUnref scope(map);
typename StagingMap<Ordered>::OptionalTuple tuple;
const Tensor* key_tensor;
const Tensor* indices_tensor;
OpInputList valu... | 121343016950748954777477429164526353429 | map_stage_op.cc | 156634864064326951745718193254274952325 | CWE-843 | CVE-2022-21734 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `MapStage` is vulnerable a `CHECK`-fail if the key tensor is not a scalar. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affec... | https://nvd.nist.gov/vuln/detail/CVE-2022-21734 |
224,181 | tensorflow | f57315566d7094f322b784947093406c2aea0d7d | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/f57315566d7094f322b784947093406c2aea0d7d | Add a check for Key being scalar tensor for MapStage and OrderedMapStage ops.
According to documentation[1][2], key must be int64 value, but this wasn't enforced and the ops would fail with check failure for non-scalar key value.
[1]https://www.tensorflow.org/api_docs/cc/class/tensorflow/ops/ordered-map-stage
[2]http... | 0 | void Compute(OpKernelContext* ctx) override {
StagingMap<Ordered>* map = nullptr;
OP_REQUIRES_OK(ctx, GetStagingMap(ctx, def(), &map));
core::ScopedUnref scope(map);
typename StagingMap<Ordered>::OptionalTuple tuple;
const Tensor* key_tensor;
const Tensor* indices_tensor;
OpInputList valu... | 155761287933118551217083530225572870599 | map_stage_op.cc | 98786060535014659477894352363015597620 | CWE-843 | CVE-2022-21734 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `MapStage` is vulnerable a `CHECK`-fail if the key tensor is not a scalar. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affec... | https://nvd.nist.gov/vuln/detail/CVE-2022-21734 |
195,308 | flatpak | 462fca2c666e0cd2b60d6d2593a7216a83047aaf | https://github.com/flatpak/flatpak | https://github.com/flatpak/flatpak/commit/462fca2c666e0cd2b60d6d2593a7216a83047aaf | run: Don't allow chroot()
If we don't allow pivot_root() then there seems no reason why we should
allow chroot().
Partially fixes GHSA-67h7-w3jq-vh4q.
Signed-off-by: Simon McVittie <smcv@collabora.com> | 1 | setup_seccomp (FlatpakBwrap *bwrap,
const char *arch,
gulong allowed_personality,
FlatpakRunFlags run_flags,
GError **error)
{
gboolean multiarch = (run_flags & FLATPAK_RUN_FLAG_MULTIARCH) != 0;
gboolean devel = (run_flags & FLATPAK_R... | 116661486604620809625071911593237669795 | flatpak-run.c | 32398709380082441128978861691951488575 | CWE-20 | CVE-2021-41133 | Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak... | https://nvd.nist.gov/vuln/detail/CVE-2021-41133 |
224,277 | flatpak | 462fca2c666e0cd2b60d6d2593a7216a83047aaf | https://github.com/flatpak/flatpak | https://github.com/flatpak/flatpak/commit/462fca2c666e0cd2b60d6d2593a7216a83047aaf | run: Don't allow chroot()
If we don't allow pivot_root() then there seems no reason why we should
allow chroot().
Partially fixes GHSA-67h7-w3jq-vh4q.
Signed-off-by: Simon McVittie <smcv@collabora.com> | 0 | setup_seccomp (FlatpakBwrap *bwrap,
const char *arch,
gulong allowed_personality,
FlatpakRunFlags run_flags,
GError **error)
{
gboolean multiarch = (run_flags & FLATPAK_RUN_FLAG_MULTIARCH) != 0;
gboolean devel = (run_flags & FLATPAK_R... | 98799963199923512278205367577377591800 | flatpak-run.c | 147844647821640300549119412024985340412 | CWE-20 | CVE-2021-41133 | Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak... | https://nvd.nist.gov/vuln/detail/CVE-2021-41133 |
195,331 | tensorflow | 08d7b00c0a5a20926363849f611729f53f3ec022 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022 | Fix Segfault in Concat V2 shape function.
PiperOrigin-RevId: 412120654
Change-Id: I3ff915faea694f9ad8b00024e9af2de9909011be | 1 | Status ConcatShapeHelper(InferenceContext* c, int start_value_index,
int end_value_index, int dim_index) {
ShapeHandle unused;
TF_RETURN_IF_ERROR(c->WithRank(c->input(dim_index), 0, &unused));
const Tensor* concat_dim_t = c->input_tensor(dim_index);
if (concat_dim_t == nullptr) {
//... | 115004012549325804010611397133680502113 | common_shape_fns.cc | 114394888048780454732842913577124501919 | CWE-843 | CVE-2022-21731 | Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `ConcatV2` can be used to trigger a denial of service attack via a segfault caused by a type confusion. The `axis` argument is translated into `concat_dim` in the `ConcatShapeHelper` helper function. Then, a value for `mi... | https://nvd.nist.gov/vuln/detail/CVE-2022-21731 |
224,570 | tensorflow | 08d7b00c0a5a20926363849f611729f53f3ec022 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022 | Fix Segfault in Concat V2 shape function.
PiperOrigin-RevId: 412120654
Change-Id: I3ff915faea694f9ad8b00024e9af2de9909011be | 0 | Status ConcatShapeHelper(InferenceContext* c, int start_value_index,
int end_value_index, int dim_index) {
ShapeHandle unused;
TF_RETURN_IF_ERROR(c->WithRank(c->input(dim_index), 0, &unused));
const Tensor* concat_dim_t = c->input_tensor(dim_index);
if (concat_dim_t == nullptr) {
//... | 224848617993634630925206364943386826300 | common_shape_fns.cc | 56524265073448960566855170405566896543 | CWE-843 | CVE-2022-21731 | Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `ConcatV2` can be used to trigger a denial of service attack via a segfault caused by a type confusion. The `axis` argument is translated into `concat_dim` in the `ConcatShapeHelper` helper function. Then, a value for `mi... | https://nvd.nist.gov/vuln/detail/CVE-2022-21731 |
195,334 | gpac | b03c9f252526bb42fbd1b87b9f5e339c3cf2390a | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/b03c9f252526bb42fbd1b87b9f5e339c3cf2390a | fixed #1890 | 1 | GF_Err iloc_box_read(GF_Box *s, GF_BitStream *bs)
{
u32 item_count, extent_count, i, j;
GF_ItemLocationBox *ptr = (GF_ItemLocationBox *)s;
ISOM_DECREASE_SIZE(ptr, 2)
ptr->offset_size = gf_bs_read_int(bs, 4);
ptr->length_size = gf_bs_read_int(bs, 4);
ptr->base_offset_size = gf_bs_read_int(bs, 4);
if (ptr->versio... | 85275035202223574859308673912965262169 | box_code_meta.c | 315220373545459860670428553876078791185 | CWE-415 | CVE-2021-40573 | The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the gf_list_del function in list.c, which allows attackers to cause a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2021-40573 |
224,728 | gpac | b03c9f252526bb42fbd1b87b9f5e339c3cf2390a | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/b03c9f252526bb42fbd1b87b9f5e339c3cf2390a | fixed #1890 | 0 | GF_Err iloc_box_read(GF_Box *s, GF_BitStream *bs)
{
u32 item_count, extent_count, i, j;
GF_ItemLocationBox *ptr = (GF_ItemLocationBox *)s;
ISOM_DECREASE_SIZE(ptr, 2)
ptr->offset_size = gf_bs_read_int(bs, 4);
ptr->length_size = gf_bs_read_int(bs, 4);
ptr->base_offset_size = gf_bs_read_int(bs, 4);
if (ptr->versio... | 326603429121921341428150431158212875495 | box_code_meta.c | 99521214022509816524954281629288020612 | CWE-415 | CVE-2021-40573 | The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the gf_list_del function in list.c, which allows attackers to cause a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2021-40573 |
195,343 | tensorflow | 002408c3696b173863228223d535f9de72a101a9 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/002408c3696b173863228223d535f9de72a101a9 | Add negative bound check for row and column pooling_sequence in FractionalAvgPoolGrad op to avoid out of bound heap access
PiperOrigin-RevId: 413837346
Change-Id: I2b86034101df31bee161abcb781755e236c7bccd | 1 | void Compute(OpKernelContext* context) override {
// Here's the basic idea:
// Batch and depth dimension are independent from row and col dimension. And
// because FractionalAvgPool currently only support pooling along row and
// col, we can basically think of this 4D tensor backpropagation as
// ... | 91555834572386312187860770421206034544 | fractional_avg_pool_op.cc | 221866619851129952189561551151828727755 | CWE-125 | CVE-2022-21730 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `FractionalAvgPoolGrad` does not consider cases where the input tensors are invalid allowing an attacker to read from outside of bounds of heap. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow ... | https://nvd.nist.gov/vuln/detail/CVE-2022-21730 |
224,891 | tensorflow | 002408c3696b173863228223d535f9de72a101a9 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/002408c3696b173863228223d535f9de72a101a9 | Add negative bound check for row and column pooling_sequence in FractionalAvgPoolGrad op to avoid out of bound heap access
PiperOrigin-RevId: 413837346
Change-Id: I2b86034101df31bee161abcb781755e236c7bccd | 0 | void Compute(OpKernelContext* context) override {
// Here's the basic idea:
// Batch and depth dimension are independent from row and col dimension. And
// because FractionalAvgPool currently only support pooling along row and
// col, we can basically think of this 4D tensor backpropagation as
// ... | 7916647560171328705762237734439424087 | fractional_avg_pool_op.cc | 273616659727040190050886150342189772450 | CWE-125 | CVE-2022-21730 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `FractionalAvgPoolGrad` does not consider cases where the input tensors are invalid allowing an attacker to read from outside of bounds of heap. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow ... | https://nvd.nist.gov/vuln/detail/CVE-2022-21730 |
195,385 | flatpak | 65cbfac982cb1c83993a9e19aa424daee8e9f042 | https://github.com/flatpak/flatpak | https://github.com/flatpak/flatpak/commit/65cbfac982cb1c83993a9e19aa424daee8e9f042 | Ensure that bundles have metadata on install
If we have a bundle without metadata we wouldn't properly present
the permissions in the transaction. | 1 | flatpak_dir_ensure_bundle_remote (FlatpakDir *self,
GFile *file,
GBytes *extra_gpg_data,
FlatpakDecomposed **out_ref,
char **out_checksum,... | 117751554146896350574194025697057651898 | flatpak-dir.c | 41005800026546918810123079124181990480 | CWE-276 | CVE-2021-43860 | Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.12.3 and 1.10.6, Flatpak doesn't properly validate that the permissions displayed to the user for an app at install time match the actual permissions granted to the app at runtime, in the case that there's a null byte in the metad... | https://nvd.nist.gov/vuln/detail/CVE-2021-43860 |
224,964 | flatpak | 65cbfac982cb1c83993a9e19aa424daee8e9f042 | https://github.com/flatpak/flatpak | https://github.com/flatpak/flatpak/commit/65cbfac982cb1c83993a9e19aa424daee8e9f042 | Ensure that bundles have metadata on install
If we have a bundle without metadata we wouldn't properly present
the permissions in the transaction. | 0 | flatpak_dir_ensure_bundle_remote (FlatpakDir *self,
GFile *file,
GBytes *extra_gpg_data,
FlatpakDecomposed **out_ref,
char **out_checksum,... | 57199236180630525002318569009544856929 | flatpak-dir.c | 126847826047276531038327785325265722415 | CWE-276 | CVE-2021-43860 | Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.12.3 and 1.10.6, Flatpak doesn't properly validate that the permissions displayed to the user for an app at install time match the actual permissions granted to the app at runtime, in the case that there's a null byte in the metad... | https://nvd.nist.gov/vuln/detail/CVE-2021-43860 |
195,389 | tensorflow | c2b31ff2d3151acb230edc3f5b1832d2c713a9e0 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/c2b31ff2d3151acb230edc3f5b1832d2c713a9e0 | Remove a `DCHECK`-fail, log an error instead.
`DCHECK` in debug mode results in crashes. TensorFlow has had multiple vulnerabilities due to this.
Outside of debug mode, `DCHECK` is a no-op.
A better alternative is to report an error to the log buffer and continue. This should happen both in debug mode and in prod mo... | 1 | bool RepeatedAttrDefEqual(
const protobuf::RepeatedPtrField<OpDef::AttrDef>& a1,
const protobuf::RepeatedPtrField<OpDef::AttrDef>& a2) {
std::unordered_map<string, const OpDef::AttrDef*> a1_set;
for (const OpDef::AttrDef& def : a1) {
DCHECK(a1_set.find(def.name()) == a1_set.end())
<< "AttrDef na... | 228350956694349821922378909162368693155 | op_def_util.cc | 43202597261631718571985626227626810269 | CWE-617 | CVE-2022-23565 | Tensorflow is an Open Source Machine Learning Framework. An attacker can trigger denial of service via assertion failure by altering a `SavedModel` on disk such that `AttrDef`s of some operation are duplicated. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, Tensor... | https://nvd.nist.gov/vuln/detail/CVE-2022-23565 |
225,086 | tensorflow | c2b31ff2d3151acb230edc3f5b1832d2c713a9e0 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/c2b31ff2d3151acb230edc3f5b1832d2c713a9e0 | Remove a `DCHECK`-fail, log an error instead.
`DCHECK` in debug mode results in crashes. TensorFlow has had multiple vulnerabilities due to this.
Outside of debug mode, `DCHECK` is a no-op.
A better alternative is to report an error to the log buffer and continue. This should happen both in debug mode and in prod mo... | 0 | bool RepeatedAttrDefEqual(
const protobuf::RepeatedPtrField<OpDef::AttrDef>& a1,
const protobuf::RepeatedPtrField<OpDef::AttrDef>& a2) {
std::unordered_map<string, const OpDef::AttrDef*> a1_set;
for (const OpDef::AttrDef& def : a1) {
if (a1_set.find(def.name()) != a1_set.end()) {
LOG(ERROR) << "At... | 7221108948147885063916901261116103162 | op_def_util.cc | 99670691263177784698689977477403265008 | CWE-617 | CVE-2022-23565 | Tensorflow is an Open Source Machine Learning Framework. An attacker can trigger denial of service via assertion failure by altering a `SavedModel` on disk such that `AttrDef`s of some operation are duplicated. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, Tensor... | https://nvd.nist.gov/vuln/detail/CVE-2022-23565 |
195,398 | v4l2loopback | e4cd225557486c420f6a34411f98c575effd43dd | https://github.com/umlaeute/v4l2loopback | https://github.com/umlaeute/v4l2loopback/commit/e4cd225557486c420f6a34411f98c575effd43dd | add explicit format specifier to printf() invocations
CWE-134 | 1 | static int vidioc_querycap(struct file *file, void *priv,
struct v4l2_capability *cap)
{
struct v4l2_loopback_device *dev = v4l2loopback_getdevice(file);
int labellen = (sizeof(cap->card) < sizeof(dev->card_label)) ?
sizeof(cap->card) :
sizeof(dev->card_label);
int device_nr =
((struct v4l... | 275249025528691740507199336736969659771 | v4l2loopback.c | 113113223463037707180278012059265756483 | CWE-134 | CVE-2022-2652 | Depending on the way the format strings in the card label are crafted it's possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row). | https://nvd.nist.gov/vuln/detail/CVE-2022-2652 |
225,383 | v4l2loopback | e4cd225557486c420f6a34411f98c575effd43dd | https://github.com/umlaeute/v4l2loopback | https://github.com/umlaeute/v4l2loopback/commit/e4cd225557486c420f6a34411f98c575effd43dd | add explicit format specifier to printf() invocations
CWE-134 | 0 | static int vidioc_querycap(struct file *file, void *priv,
struct v4l2_capability *cap)
{
struct v4l2_loopback_device *dev = v4l2loopback_getdevice(file);
int labellen = (sizeof(cap->card) < sizeof(dev->card_label)) ?
sizeof(cap->card) :
sizeof(dev->card_label);
int device_nr =
((struct v4l... | 178769376518603723181418371440757147493 | v4l2loopback.c | 138252299614112344688826607831650943411 | CWE-134 | CVE-2022-2652 | Depending on the way the format strings in the card label are crafted it's possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row). | https://nvd.nist.gov/vuln/detail/CVE-2022-2652 |
195,399 | tensorflow | 045deec1cbdebb27d817008ad5df94d96a08b1bf | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf | Prevent null pointer dereference in `mutable_graph_view`
PiperOrigin-RevId: 409684472
Change-Id: I577eb9d9ac470fcec0501423171e739a4ec0cb5c | 1 | bool IsIdentityConsumingSwitch(const MutableGraphView& graph,
const NodeDef& node) {
if ((IsIdentity(node) || IsIdentityNSingleInput(node)) &&
node.input_size() > 0) {
TensorId tensor_id = ParseTensorName(node.input(0));
if (IsTensorIdControlling(tensor_id)) {
return... | 313619660222966312087557415210995637728 | mutable_graph_view.cc | 11824580899895481141820753687530297202 | CWE-476 | CVE-2022-23589 | Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the sec... | https://nvd.nist.gov/vuln/detail/CVE-2022-23589 |
225,473 | tensorflow | 045deec1cbdebb27d817008ad5df94d96a08b1bf | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf | Prevent null pointer dereference in `mutable_graph_view`
PiperOrigin-RevId: 409684472
Change-Id: I577eb9d9ac470fcec0501423171e739a4ec0cb5c | 0 | bool IsIdentityConsumingSwitch(const MutableGraphView& graph,
const NodeDef& node) {
if ((IsIdentity(node) || IsIdentityNSingleInput(node)) &&
node.input_size() > 0) {
TensorId tensor_id = ParseTensorName(node.input(0));
if (IsTensorIdControlling(tensor_id)) {
return... | 186036134407007049668950369044144546274 | mutable_graph_view.cc | 183902084895507336616240181892029435869 | CWE-476 | CVE-2022-23589 | Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the sec... | https://nvd.nist.gov/vuln/detail/CVE-2022-23589 |
195,403 | tensorflow | a1e1511dde36b3f8aa27a6ec630838e7ea40e091 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091 | [lite] Update TfLiteIntArrayCreate to return size_t
PiperOrigin-RevId: 416439896
Change-Id: I847f69b68d1ddaff4b1e925a09b8b69c1756653b | 1 | TfLiteIntArray* TfLiteIntArrayCreate(int size) {
int alloc_size = TfLiteIntArrayGetSizeInBytes(size);
if (alloc_size <= 0) return NULL;
TfLiteIntArray* ret = (TfLiteIntArray*)malloc(alloc_size);
if (!ret) return ret;
ret->size = size;
return ret;
} | 64742066879088615123277599572040485093 | common.c | 227108095659128555473924245568634074234 | CWE-190 | CVE-2022-23558 | Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in `TfLiteIntArrayCreate`. The `TfLiteIntArrayGetSizeInBytes` returns an `int` instead of a `size_t. An attacker can control model inputs such that `computed_size` overflows the size of `in... | https://nvd.nist.gov/vuln/detail/CVE-2022-23558 |
225,552 | tensorflow | a1e1511dde36b3f8aa27a6ec630838e7ea40e091 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091 | [lite] Update TfLiteIntArrayCreate to return size_t
PiperOrigin-RevId: 416439896
Change-Id: I847f69b68d1ddaff4b1e925a09b8b69c1756653b | 0 | TfLiteIntArray* TfLiteIntArrayCreate(int size) {
size_t alloc_size = TfLiteIntArrayGetSizeInBytes(size);
if (alloc_size <= 0) return NULL;
TfLiteIntArray* ret = (TfLiteIntArray*)malloc(alloc_size);
if (!ret) return ret;
ret->size = size;
return ret;
} | 125057143458607684207882855383643521977 | common.c | 141963346575108043523158725755967478163 | CWE-190 | CVE-2022-23558 | Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in `TfLiteIntArrayCreate`. The `TfLiteIntArrayGetSizeInBytes` returns an `int` instead of a `size_t. An attacker can control model inputs such that `computed_size` overflows the size of `in... | https://nvd.nist.gov/vuln/detail/CVE-2022-23558 |
195,405 | ImageMagick6 | 29c8abce0da56b536542f76a9ddfebdaab5b2943 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943 | https://github.com/ImageMagick/ImageMagick/pull/4986 | 1 | static Image *ReadPCLImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define CropBox "CropBox"
#define DeviceCMYK "DeviceCMYK"
#define MediaBox "MediaBox"
#define RenderPCLText " Rendering PCL... "
char
command[MaxTextExtent],
*density,
filename[MaxTextExtent],
geometry[MaxTextExt... | 285956846610376765198872183403915882061 | pcl.c | 338547174937023730341471137685130471169 | CWE-190 | CVE-2022-32546 | A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior. | https://nvd.nist.gov/vuln/detail/CVE-2022-32546 |
225,566 | ImageMagick6 | 29c8abce0da56b536542f76a9ddfebdaab5b2943 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943 | https://github.com/ImageMagick/ImageMagick/pull/4986 | 0 | static Image *ReadPCLImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define CropBox "CropBox"
#define DeviceCMYK "DeviceCMYK"
#define MediaBox "MediaBox"
#define RenderPCLText " Rendering PCL... "
char
command[MaxTextExtent],
*density,
filename[MaxTextExtent],
geometry[MaxTextExt... | 83929363874861063792960158581169163951 | pcl.c | 19401947442598835469700605981025281430 | CWE-190 | CVE-2022-32546 | A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior. | https://nvd.nist.gov/vuln/detail/CVE-2022-32546 |
195,409 | gpac | 64a2e1b799352ac7d7aad1989bc06e7b0f2b01db | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/64a2e1b799352ac7d7aad1989bc06e7b0f2b01db | fixed #2092 | 1 |
void gitn_box_del(GF_Box *s)
{
u32 i;
GroupIdToNameBox *ptr = (GroupIdToNameBox *)s;
if (ptr == NULL) return;
for (i=0; i<ptr->nb_entries; i++) {
if (ptr->entries[i].name) gf_free(ptr->entries[i].name);
}
if (ptr->entries) gf_free(ptr->entries);
gf_free(ptr); | 37642310110270321687625000100653046485 | box_code_base.c | 212802147696207025803784466432150384318 | CWE-476 | CVE-2021-4043 | NULL Pointer Dereference in GitHub repository gpac/gpac prior to 1.1.0. | https://nvd.nist.gov/vuln/detail/CVE-2021-4043 |
226,029 | gpac | 64a2e1b799352ac7d7aad1989bc06e7b0f2b01db | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/64a2e1b799352ac7d7aad1989bc06e7b0f2b01db | fixed #2092 | 0 |
void gitn_box_del(GF_Box *s)
{
u32 i;
GroupIdToNameBox *ptr = (GroupIdToNameBox *)s;
if (ptr == NULL) return;
if (ptr->entries) {
for (i=0; i<ptr->nb_entries; i++) {
if (ptr->entries[i].name) gf_free(ptr->entries[i].name);
}
gf_free(ptr->entries);
}
gf_free(ptr); | 265612189453593240220286582640125308421 | box_code_base.c | 49851003819063672326837979869211393199 | CWE-476 | CVE-2021-4043 | NULL Pointer Dereference in GitHub repository gpac/gpac prior to 1.1.0. | https://nvd.nist.gov/vuln/detail/CVE-2021-4043 |
195,410 | tensorflow | 965b97e4a9650495cda5a8c210ef6684b4b9eceb | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/965b97e4a9650495cda5a8c210ef6684b4b9eceb | Properly validate sparse tensor in `SparseTensorSliceDataset`
Existing validation was incomplete.
PiperOrigin-RevId: 415375048
Change-Id: I14cd18f29ede73286f3ffac35171bd15828997e9 | 1 | void MakeDataset(OpKernelContext* ctx, DatasetBase** output) override {
// Create a new SparseTensorSliceDatasetOp::Dataset, insert it in
// the step container, and return it as the output.
const Tensor* indices;
OP_REQUIRES_OK(ctx, ctx->input("indices", &indices));
const Tensor* values;
OP_RE... | 232798786480644222523895580158118045723 | sparse_tensor_slice_dataset_op.cc | 20179985196620256343354076777909821072 | CWE-476 | CVE-2022-21736 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseTensorSliceDataset` has an undefined behavior: under certain condition it can be made to dereference a `nullptr` value. The 3 input arguments to `SparseTensorSliceDataset` represent a sparse tensor. However, there are some preconditio... | https://nvd.nist.gov/vuln/detail/CVE-2022-21736 |
226,433 | tensorflow | 965b97e4a9650495cda5a8c210ef6684b4b9eceb | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/965b97e4a9650495cda5a8c210ef6684b4b9eceb | Properly validate sparse tensor in `SparseTensorSliceDataset`
Existing validation was incomplete.
PiperOrigin-RevId: 415375048
Change-Id: I14cd18f29ede73286f3ffac35171bd15828997e9 | 0 | void MakeDataset(OpKernelContext* ctx, DatasetBase** output) override {
// Create a new SparseTensorSliceDatasetOp::Dataset, insert it in
// the step container, and return it as the output.
const Tensor* indices;
OP_REQUIRES_OK(ctx, ctx->input("indices", &indices));
const Tensor* values;
OP_RE... | 227797014623034241967270311347340556143 | sparse_tensor_slice_dataset_op.cc | 223168035118292217298610217555690212472 | CWE-476 | CVE-2022-21736 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseTensorSliceDataset` has an undefined behavior: under certain condition it can be made to dereference a `nullptr` value. The 3 input arguments to `SparseTensorSliceDataset` represent a sparse tensor. However, there are some preconditio... | https://nvd.nist.gov/vuln/detail/CVE-2022-21736 |
195,665 | njs | 2e00e95473861846aa8538be87db07699d9f676d | https://github.com/nginx/njs | https://github.com/nginx/njs/commit/2e00e95473861846aa8538be87db07699d9f676d | Fixed Array.prototype.slice() with slow "this" argument.
Previously, when "this" argument was not a fast array, but the "deleted" array
was a fast array, the "deleted" array may be left in uninitialized state if
"this" argument had gaps.
This fix is to ensure that "deleted" is properly initialized.
This fixes #485 i... | 1 | njs_array_prototype_splice(njs_vm_t *vm, njs_value_t *args, njs_uint_t nargs,
njs_index_t unused)
{
int64_t i, n, start, length, items, delta, delete;
njs_int_t ret;
njs_value_t *this, value, del_object;
njs_array_t *array, *deleted;
this = njs_argument(args, 0);
ret = njs_value_... | 41889957200154277256182614621042854713 | njs_array.c | 27861953644579332654826088207600556930 | CWE-703 | CVE-2022-29779 | Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_value_own_enumerate at src/njs_value.c. | https://nvd.nist.gov/vuln/detail/CVE-2022-29779 |
230,302 | njs | 2e00e95473861846aa8538be87db07699d9f676d | https://github.com/nginx/njs | https://github.com/nginx/njs/commit/2e00e95473861846aa8538be87db07699d9f676d | Fixed Array.prototype.slice() with slow "this" argument.
Previously, when "this" argument was not a fast array, but the "deleted" array
was a fast array, the "deleted" array may be left in uninitialized state if
"this" argument had gaps.
This fix is to ensure that "deleted" is properly initialized.
This fixes #485 i... | 0 | njs_array_prototype_splice(njs_vm_t *vm, njs_value_t *args, njs_uint_t nargs,
njs_index_t unused)
{
int64_t i, n, start, length, items, delta, delete;
njs_int_t ret;
njs_value_t *this, value, del_object;
njs_array_t *array, *deleted;
this = njs_argument(args, 0);
ret = njs_value_... | 91452857281463208584852927019432341939 | njs_array.c | 127478727069540736637535553874506726763 | CWE-703 | CVE-2022-29779 | Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_value_own_enumerate at src/njs_value.c. | https://nvd.nist.gov/vuln/detail/CVE-2022-29779 |
195,670 | pjproject | 856f87c2e97a27b256482dbe0d748b1194355a21 | https://github.com/pjsip/pjproject | https://github.com/pjsip/pjproject/commit/856f87c2e97a27b256482dbe0d748b1194355a21 | Merge pull request from GHSA-5x45-qp78-g4p4
* Prevent infinite loop in scanning xml content
* Simplify scanning method
* Optimization | 1 | static pj_xml_node *xml_parse_node( pj_pool_t *pool, pj_scanner *scanner)
{
pj_xml_node *node;
pj_str_t end_name;
PJ_CHECK_STACK();
if (*scanner->curptr != '<')
on_syntax_error(scanner);
/* Handle Processing Instructino (PI) construct (i.e. "<?") */
if (*scanner->curptr == '<' && *(scanner->... | 277240174945375908655928995975016589842 | xml.c | 319030018310003515806173873266013713455 | CWE-703 | CVE-2022-24763 | PJSIP is a free and open source multimedia communication library written in the C language. Versions 2.12 and prior contain a denial-of-service vulnerability that affects PJSIP users that consume PJSIP's XML parsing in their apps. Users are advised to update. There are no known workarounds. | https://nvd.nist.gov/vuln/detail/CVE-2022-24763 |
230,394 | pjproject | 856f87c2e97a27b256482dbe0d748b1194355a21 | https://github.com/pjsip/pjproject | https://github.com/pjsip/pjproject/commit/856f87c2e97a27b256482dbe0d748b1194355a21 | Merge pull request from GHSA-5x45-qp78-g4p4
* Prevent infinite loop in scanning xml content
* Simplify scanning method
* Optimization | 0 | static pj_xml_node *xml_parse_node( pj_pool_t *pool, pj_scanner *scanner)
{
pj_xml_node *node;
pj_str_t end_name;
PJ_CHECK_STACK();
if (*scanner->curptr != '<')
on_syntax_error(scanner);
/* Handle Processing Instructino (PI) construct (i.e. "<?") */
if (*scanner->curptr == '<' && *(scanner->... | 333353357538572797993178277028111202319 | xml.c | 137943726532385231053862962299057228575 | CWE-703 | CVE-2022-24763 | PJSIP is a free and open source multimedia communication library written in the C language. Versions 2.12 and prior contain a denial-of-service vulnerability that affects PJSIP users that consume PJSIP's XML parsing in their apps. Users are advised to update. There are no known workarounds. | https://nvd.nist.gov/vuln/detail/CVE-2022-24763 |
195,691 | mruby | a4d97934d51cb88954cc49161dc1d151f64afb6b | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/a4d97934d51cb88954cc49161dc1d151f64afb6b | vm.c: check if target_class is NULL (when prepended). | 1 | mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc)
{
/* mrb_assert(MRB_PROC_CFUNC_P(proc)) */
const mrb_irep *irep = proc->body.irep;
const mrb_pool_value *pool = irep->pool;
const mrb_sym *syms = irep->syms;
mrb_code insn;
int ai = mrb_gc_arena_save(mrb);
struct mrb_jmpbuf *prev_jm... | 44658455618798852770197569753613577766 | vm.c | 164058079299968555060167307813659313262 | CWE-703 | CVE-2022-1427 | Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby prior to 3.2. # Impact: Possible arbitrary code execution if being exploited. | https://nvd.nist.gov/vuln/detail/CVE-2022-1427 |
231,012 | mruby | a4d97934d51cb88954cc49161dc1d151f64afb6b | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/a4d97934d51cb88954cc49161dc1d151f64afb6b | vm.c: check if target_class is NULL (when prepended). | 0 | mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc)
{
/* mrb_assert(MRB_PROC_CFUNC_P(proc)) */
const mrb_irep *irep = proc->body.irep;
const mrb_pool_value *pool = irep->pool;
const mrb_sym *syms = irep->syms;
mrb_code insn;
int ai = mrb_gc_arena_save(mrb);
struct mrb_jmpbuf *prev_jm... | 104703994590688087058145131124808583742 | vm.c | 126976644189338180144758453935885521875 | CWE-703 | CVE-2022-1427 | Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby prior to 3.2. # Impact: Possible arbitrary code execution if being exploited. | https://nvd.nist.gov/vuln/detail/CVE-2022-1427 |
195,742 | gpac | 37592ad86c6ca934d34740012213e467acc4a3b0 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/37592ad86c6ca934d34740012213e467acc4a3b0 | fixed #2163 | 1 | static GF_Err gf_isom_parse_movie_boxes_internal(GF_ISOFile *mov, u32 *boxType, u64 *bytesMissing, Bool progressive_mode)
{
GF_Box *a;
u64 totSize, mdat_end=0;
GF_Err e = GF_OK;
#ifndef GPAC_DISABLE_ISOM_FRAGMENTS
if (mov->single_moof_mode && mov->single_moof_state == 2) {
return e;
}
/*restart from where we ... | 68912157747726016692935177449045975431 | None | CWE-476 | CVE-2022-29340 | GPAC 2.1-DEV-rev87-g053aae8-master. has a Null Pointer Dereference vulnerability in gf_isom_parse_movie_boxes_internal due to improper return value handling of GF_SKIP_BOX, which causes a Denial of Service. This vulnerability was fixed in commit 37592ad. | https://nvd.nist.gov/vuln/detail/CVE-2022-29340 | |
232,329 | gpac | 37592ad86c6ca934d34740012213e467acc4a3b0 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/37592ad86c6ca934d34740012213e467acc4a3b0 | fixed #2163 | 0 | static GF_Err gf_isom_parse_movie_boxes_internal(GF_ISOFile *mov, u32 *boxType, u64 *bytesMissing, Bool progressive_mode)
{
GF_Box *a;
u64 totSize, mdat_end=0;
GF_Err e = GF_OK;
#ifndef GPAC_DISABLE_ISOM_FRAGMENTS
if (mov->single_moof_mode && mov->single_moof_state == 2) {
return e;
}
/*restart from where we ... | 33398552270127430256413281511092874838 | None | CWE-476 | CVE-2022-29340 | GPAC 2.1-DEV-rev87-g053aae8-master. has a Null Pointer Dereference vulnerability in gf_isom_parse_movie_boxes_internal due to improper return value handling of GF_SKIP_BOX, which causes a Denial of Service. This vulnerability was fixed in commit 37592ad. | https://nvd.nist.gov/vuln/detail/CVE-2022-29340 | |
195,752 | tensorflow | 02cc160e29d20631de3859c6653184e3f876b9d7 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/02cc160e29d20631de3859c6653184e3f876b9d7 | Prevent nullptr deref in SparseTensorSliceDataset
The arguments must determine a valid sparse tensor. This means that when indices are empty then the values must be empty too (and the reverse).
Also added test, by modifying existing test with empty sparse tensor to now run with an invalid sparse tensor input.
PiperO... | 1 | void MakeDataset(OpKernelContext* ctx, DatasetBase** output) override {
// Create a new SparseTensorSliceDatasetOp::Dataset, insert it in
// the step container, and return it as the output.
const Tensor* indices;
OP_REQUIRES_OK(ctx, ctx->input("indices", &indices));
const Tensor* values;
OP_RE... | 111818826187244494245403789873500831419 | sparse_tensor_slice_dataset_op.cc | 152047584060469134260687844063366554733 | CWE-476 | CVE-2021-37647 | TensorFlow is an end-to-end open source platform for machine learning. When a user does not supply arguments that determine a valid sparse tensor, `tf.raw_ops.SparseTensorSliceDataset` implementation can be made to dereference a null pointer. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6a... | https://nvd.nist.gov/vuln/detail/CVE-2021-37647 |
232,405 | tensorflow | 02cc160e29d20631de3859c6653184e3f876b9d7 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/02cc160e29d20631de3859c6653184e3f876b9d7 | Prevent nullptr deref in SparseTensorSliceDataset
The arguments must determine a valid sparse tensor. This means that when indices are empty then the values must be empty too (and the reverse).
Also added test, by modifying existing test with empty sparse tensor to now run with an invalid sparse tensor input.
PiperO... | 0 | void MakeDataset(OpKernelContext* ctx, DatasetBase** output) override {
// Create a new SparseTensorSliceDatasetOp::Dataset, insert it in
// the step container, and return it as the output.
const Tensor* indices;
OP_REQUIRES_OK(ctx, ctx->input("indices", &indices));
const Tensor* values;
OP_RE... | 126239557450594194918340916106898261954 | sparse_tensor_slice_dataset_op.cc | 188414793374606504588915566744198162485 | CWE-476 | CVE-2021-37647 | TensorFlow is an end-to-end open source platform for machine learning. When a user does not supply arguments that determine a valid sparse tensor, `tf.raw_ops.SparseTensorSliceDataset` implementation can be made to dereference a null pointer. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6a... | https://nvd.nist.gov/vuln/detail/CVE-2021-37647 |
195,800 | deark | 62acb7753b0e3c0d3ab3c15057b0a65222313334 | https://github.com/jsummers/deark | https://github.com/jsummers/deark/commit/62acb7753b0e3c0d3ab3c15057b0a65222313334 | pict,macrsrc: Fixed a bug that could cause division by 0
Found by F. Çelik. | 1 | void fmtutil_macbitmap_read_pixmap_only_fields(deark *c, dbuf *f, struct fmtutil_macbitmap_info *bi,
i64 pos)
{
i64 pixmap_version;
i64 pack_size;
i64 plane_bytes;
i64 n;
de_dbg(c, "additional PixMap header fields, at %d", (int)pos);
de_dbg_indent(c, 1);
pixmap_version = dbuf_getu16be(f, pos+0);
de_dbg(c, "p... | 203544519943268578056087775697493086183 | fmtutil.c | 198892381443353894699781903058114971913 | CWE-369 | CVE-2021-28856 | In Deark before v1.5.8, a specially crafted input file can cause a division by zero in (src/fmtutil.c) because of the value of pixelsize. | https://nvd.nist.gov/vuln/detail/CVE-2021-28856 |
233,862 | deark | 62acb7753b0e3c0d3ab3c15057b0a65222313334 | https://github.com/jsummers/deark | https://github.com/jsummers/deark/commit/62acb7753b0e3c0d3ab3c15057b0a65222313334 | pict,macrsrc: Fixed a bug that could cause division by 0
Found by F. Çelik. | 0 | void fmtutil_macbitmap_read_pixmap_only_fields(deark *c, dbuf *f, struct fmtutil_macbitmap_info *bi,
i64 pos)
{
i64 pixmap_version;
i64 pack_size;
i64 plane_bytes;
i64 n;
de_dbg(c, "additional PixMap header fields, at %d", (int)pos);
de_dbg_indent(c, 1);
pixmap_version = dbuf_getu16be(f, pos+0);
de_dbg(c, "p... | 165750695801886950946994956858448129756 | fmtutil.c | 134744298134309373748233562166931104409 | CWE-369 | CVE-2021-28856 | In Deark before v1.5.8, a specially crafted input file can cause a division by zero in (src/fmtutil.c) because of the value of pixelsize. | https://nvd.nist.gov/vuln/detail/CVE-2021-28856 |
195,965 | tensorflow | 30721cf564cb029d34535446d6a5a6357bebc8e7 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/30721cf564cb029d34535446d6a5a6357bebc8e7 | Fix tf.raw_ops.EditDistance vulnerability with negative indices.
Check that indices are non-negative. Fix several identical code sites.
Clean up grammar in error message.
PiperOrigin-RevId: 445442017 | 1 | void Compute(OpKernelContext* ctx) override {
const Tensor* hypothesis_indices;
const Tensor* hypothesis_values;
const Tensor* hypothesis_shape;
const Tensor* truth_indices;
const Tensor* truth_values;
const Tensor* truth_shape;
OP_REQUIRES_OK(ctx, ctx->input("hypothesis_indices", &hypothe... | 330908344605810468129440704571471984591 | edit_distance_op.cc | 218278977682570302037113861275408263141 | CWE-787 | CVE-2022-29208 | TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.EditDistance` has incomplete validation. Users can pass negative values to cause a segmentation fault based denial of service. In multiple places throughout the code, one may c... | https://nvd.nist.gov/vuln/detail/CVE-2022-29208 |
235,765 | tensorflow | 30721cf564cb029d34535446d6a5a6357bebc8e7 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/30721cf564cb029d34535446d6a5a6357bebc8e7 | Fix tf.raw_ops.EditDistance vulnerability with negative indices.
Check that indices are non-negative. Fix several identical code sites.
Clean up grammar in error message.
PiperOrigin-RevId: 445442017 | 0 | void Compute(OpKernelContext* ctx) override {
const Tensor* hypothesis_indices;
const Tensor* hypothesis_values;
const Tensor* hypothesis_shape;
const Tensor* truth_indices;
const Tensor* truth_values;
const Tensor* truth_shape;
OP_REQUIRES_OK(ctx, ctx->input("hypothesis_indices", &hypothe... | 248166369480919859740493813092777127281 | edit_distance_op.cc | 224900034498319197270351200055296266799 | CWE-787 | CVE-2022-29208 | TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.EditDistance` has incomplete validation. Users can pass negative values to cause a segmentation fault based denial of service. In multiple places throughout the code, one may c... | https://nvd.nist.gov/vuln/detail/CVE-2022-29208 |
195,984 | gpac | 3dbe11b37d65c8472faf0654410068e5500b3adb | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/3dbe11b37d65c8472faf0654410068e5500b3adb | fixed #2175 | 1 | GF_Err diST_box_read(GF_Box *s, GF_BitStream *bs)
{
u32 i;
char str[1024];
GF_DIMSScriptTypesBox *p = (GF_DIMSScriptTypesBox *)s;
i=0;
str[0]=0;
while (1) {
str[i] = gf_bs_read_u8(bs);
if (!str[i]) break;
i++;
}
ISOM_DECREASE_SIZE(p, i);
p->content_script_types = gf_strdup(str);
return GF_OK;
} | 337508066102203205232219987774332438264 | box_code_3gpp.c | 236995747067078276861335410375287788449 | CWE-703 | CVE-2022-1441 | MP4Box is a component of GPAC-2.0.0, which is a widely-used third-party package on RPM Fusion. When MP4Box tries to parse a MP4 file, it calls the function `diST_box_read()` to read from video. In this function, it allocates a buffer `str` with fixed length. However, content read from `bs` is controllable by user, so i... | https://nvd.nist.gov/vuln/detail/CVE-2022-1441 |
236,125 | gpac | 3dbe11b37d65c8472faf0654410068e5500b3adb | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/3dbe11b37d65c8472faf0654410068e5500b3adb | fixed #2175 | 0 | GF_Err diST_box_read(GF_Box *s, GF_BitStream *bs)
{
GF_DIMSScriptTypesBox *p = (GF_DIMSScriptTypesBox *)s;
p->content_script_types = gf_malloc(sizeof(char) * (s->size+1));
if (!p->content_script_types) return GF_OUT_OF_MEM;
gf_bs_read_data(bs, p->content_script_types, s->size);
p->content_script_types[s->size] = ... | 296645158113148498272091333023062986276 | box_code_3gpp.c | 53964259103061248299506412136196602333 | CWE-703 | CVE-2022-1441 | MP4Box is a component of GPAC-2.0.0, which is a widely-used third-party package on RPM Fusion. When MP4Box tries to parse a MP4 file, it calls the function `diST_box_read()` to read from video. In this function, it allocates a buffer `str` with fixed length. However, content read from `bs` is controllable by user, so i... | https://nvd.nist.gov/vuln/detail/CVE-2022-1441 |
196,276 | lsquic | a74702c630e108125e71898398737baec8f02238 | https://github.com/litespeedtech/lsquic | https://github.com/litespeedtech/lsquic/commit/a74702c630e108125e71898398737baec8f02238 | Release 3.1.0 | 1 | lsquic_qeh_settings (struct qpack_enc_hdl *qeh, unsigned max_table_size,
unsigned dyn_table_size, unsigned max_risked_streams, int server)
{
enum lsqpack_enc_opts enc_opts;
assert(qeh->qeh_flags & QEH_INITIALIZED);
if (qeh->qeh_flags & QEH_HAVE_SETTINGS)
{
LSQ_WARN("settings alrea... | 304358665951404548699605657299704903588 | None | CWE-269 | CVE-2022-30592 | liblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandles MAX_TABLE_CAPACITY. | https://nvd.nist.gov/vuln/detail/CVE-2022-30592 | |
237,885 | lsquic | a74702c630e108125e71898398737baec8f02238 | https://github.com/litespeedtech/lsquic | https://github.com/litespeedtech/lsquic/commit/a74702c630e108125e71898398737baec8f02238 | Release 3.1.0 | 0 | lsquic_qeh_settings (struct qpack_enc_hdl *qeh, unsigned max_table_size,
unsigned dyn_table_size, unsigned max_risked_streams, int server)
{
enum lsqpack_enc_opts enc_opts;
assert(qeh->qeh_flags & QEH_INITIALIZED);
if (qeh->qeh_flags & QEH_HAVE_SETTINGS)
{
LSQ_WARN("settings alrea... | 213495580933926260913554982368628219722 | None | CWE-269 | CVE-2022-30592 | liblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandles MAX_TABLE_CAPACITY. | https://nvd.nist.gov/vuln/detail/CVE-2022-30592 | |
196,316 | barebox | 0a9f9a7410681e55362f8311537ebc7be9ad0fbe | https://github.com/saschahauer/barebox | https://github.com/saschahauer/barebox/commit/0a9f9a7410681e55362f8311537ebc7be9ad0fbe | crypto: digest: use crypto_memneq()
When verifying a digest it is important not to leak timing information
through memcmp(). Use crypto_memneq() instead.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de> | 1 | int digest_generic_verify(struct digest *d, const unsigned char *md)
{
int ret;
int len = digest_length(d);
unsigned char *tmp;
tmp = xmalloc(len);
ret = digest_final(d, tmp);
if (ret)
goto end;
ret = memcmp(md, tmp, len);
ret = ret ? -EINVAL : 0;
end:
free(tmp);
return ret;
} | 71480685616976545176363965575731858659 | digest.c | 309636649404648894565051311749383985179 | CWE-200 | CVE-2021-37847 | crypto/digest.c in Pengutronix barebox through 2021.07.0 leaks timing information because memcmp is used during digest verification. | https://nvd.nist.gov/vuln/detail/CVE-2021-37847 |
238,322 | barebox | 0a9f9a7410681e55362f8311537ebc7be9ad0fbe | https://github.com/saschahauer/barebox | https://github.com/saschahauer/barebox/commit/0a9f9a7410681e55362f8311537ebc7be9ad0fbe | crypto: digest: use crypto_memneq()
When verifying a digest it is important not to leak timing information
through memcmp(). Use crypto_memneq() instead.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de> | 0 | int digest_generic_verify(struct digest *d, const unsigned char *md)
{
int ret;
int len = digest_length(d);
unsigned char *tmp;
tmp = xmalloc(len);
ret = digest_final(d, tmp);
if (ret)
goto end;
if (crypto_memneq(md, tmp, len))
ret = -EINVAL;
else
ret = 0;
end:
free(tmp);
return ret;
} | 320239189684468072245266956547158344510 | digest.c | 195235961590850585727206932057971391683 | CWE-200 | CVE-2021-37847 | crypto/digest.c in Pengutronix barebox through 2021.07.0 leaks timing information because memcmp is used during digest verification. | https://nvd.nist.gov/vuln/detail/CVE-2021-37847 |
196,328 | vim | 409510c588b1eec1ae33511ae97a21eb8e110895 | https://github.com/vim/vim | https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895 | patch 8.2.5050: using freed memory when searching for pattern in path
Problem: Using freed memory when searching for pattern in path.
Solution: Make a copy of the line. | 1 | find_pattern_in_path(
char_u *ptr, // pointer to search pattern
int dir UNUSED, // direction of expansion
int len, // length of search pattern
int whole, // match whole words only
int skip_comments, // don't match inside comments
int type, // Type of search; are we looking for a type?
... | 123923862521809134964983633516065480238 | search.c | 229512534202460810065416633781657256150 | CWE-416 | CVE-2022-1968 | Use After Free in GitHub repository vim/vim prior to 8.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-1968 |
238,803 | vim | 409510c588b1eec1ae33511ae97a21eb8e110895 | https://github.com/vim/vim | https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895 | patch 8.2.5050: using freed memory when searching for pattern in path
Problem: Using freed memory when searching for pattern in path.
Solution: Make a copy of the line. | 0 | find_pattern_in_path(
char_u *ptr, // pointer to search pattern
int dir UNUSED, // direction of expansion
int len, // length of search pattern
int whole, // match whole words only
int skip_comments, // don't match inside comments
int type, // Type of search; are we looking for a type?
... | 332560855806865581562523893033870446906 | search.c | 30662263767422374466151794140989574879 | CWE-416 | CVE-2022-1968 | Use After Free in GitHub repository vim/vim prior to 8.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-1968 |
196,578 | vim | 44db8213d38c39877d2148eff6a72f4beccfb94e | https://github.com/vim/vim | https://github.com/vim/vim/commit/44db8213d38c39877d2148eff6a72f4beccfb94e | patch 8.2.4219: reading before the start of the line
Problem: Reading before the start of the line.
Solution: Check boundary before trying to read the character. | 1 | yank_copy_line(struct block_def *bd, long y_idx, int exclude_trailing_space)
{
char_u *pnew;
if (exclude_trailing_space)
bd->endspaces = 0;
if ((pnew = alloc(bd->startspaces + bd->endspaces + bd->textlen + 1))
== NULL)
return FAIL;
y_current->y_array[y_idx] = pnew;
vim_memset(pnew, ... | 329046653104270093704788517563971777510 | register.c | 197045442768005159362544298682780980387 | CWE-787 | CVE-2022-0407 | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-0407 |
240,276 | vim | 44db8213d38c39877d2148eff6a72f4beccfb94e | https://github.com/vim/vim | https://github.com/vim/vim/commit/44db8213d38c39877d2148eff6a72f4beccfb94e | patch 8.2.4219: reading before the start of the line
Problem: Reading before the start of the line.
Solution: Check boundary before trying to read the character. | 0 | yank_copy_line(struct block_def *bd, long y_idx, int exclude_trailing_space)
{
char_u *pnew;
if (exclude_trailing_space)
bd->endspaces = 0;
if ((pnew = alloc(bd->startspaces + bd->endspaces + bd->textlen + 1))
== NULL)
return FAIL;
y_current->y_array[y_idx] = pnew;
vim_memset(pnew, ... | 215111577434116975174543951046273639484 | register.c | 303069020104340496076924952267660178460 | CWE-787 | CVE-2022-0407 | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-0407 |
196,629 | tensorflow | 579261dcd446385831fe4f7457d802a59685121d | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/579261dcd446385831fe4f7457d802a59685121d | Fix crash in MatrixSolve when inputs have different batch dimensions.
Before, the process would crash or certain elements would be silently ignored. Now an InvalidArgument is raised.
PiperOrigin-RevId: 384844020
Change-Id: Iba44417e383bdd0e1abc4012bfca83b2377dd335 | 1 | void ComputeAsync(OpKernelContext* context, DoneCallback done) final {
const Tensor& input = context->input(0);
const Tensor& rhs = context->input(1);
const int ndims = input.dims();
const int64 n = input.dim_size(ndims - 1);
const int64 nrhs = rhs.dim_size(ndims - 1);
// Validate inputs.
... | 232512673394609281083836207268567643755 | matrix_solve_op.cc | 18056043033202767652193305242094140715 | CWE-354 | CVE-2021-41206 | TensorFlow is an open source platform for machine learning. In affected versions several TensorFlow operations are missing validation for the shapes of the tensor arguments involved in the call. Depending on the API, this can result in undefined behavior and segfault or `CHECK`-fail related crashes but in some scenario... | https://nvd.nist.gov/vuln/detail/CVE-2021-41206 |
241,369 | tensorflow | 579261dcd446385831fe4f7457d802a59685121d | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/579261dcd446385831fe4f7457d802a59685121d | Fix crash in MatrixSolve when inputs have different batch dimensions.
Before, the process would crash or certain elements would be silently ignored. Now an InvalidArgument is raised.
PiperOrigin-RevId: 384844020
Change-Id: Iba44417e383bdd0e1abc4012bfca83b2377dd335 | 0 | void ComputeAsync(OpKernelContext* context, DoneCallback done) final {
const Tensor& input = context->input(0);
const Tensor& rhs = context->input(1);
const int ndims = input.dims();
const int64 n = input.dim_size(ndims - 1);
const int64 nrhs = rhs.dim_size(ndims - 1);
// Validate inputs.
... | 213027909579375149223707117272594449042 | matrix_solve_op.cc | 56729187938743390978402639550963026335 | CWE-354 | CVE-2021-41206 | TensorFlow is an open source platform for machine learning. In affected versions several TensorFlow operations are missing validation for the shapes of the tensor arguments involved in the call. Depending on the API, this can result in undefined behavior and segfault or `CHECK`-fail related crashes but in some scenario... | https://nvd.nist.gov/vuln/detail/CVE-2021-41206 |
196,705 | tensorflow | 11ced8467eccad9c7cb94867708be8fa5c66c730 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/11ced8467eccad9c7cb94867708be8fa5c66c730 | Fix UB in SparseTensorDenseAdd
Added more input validation to avoid nullptr dereferencing and array index
out of bounds issues.
PiperOrigin-RevId: 446192704 | 1 | Status ValidateInputs(const Tensor *a_indices, const Tensor *a_values,
const Tensor *a_shape, const Tensor *b) {
if (!TensorShapeUtils::IsMatrix(a_indices->shape())) {
return errors::InvalidArgument(
"Input a_indices should be a matrix but received shape: ",
a_indices->shape(... | 308425823880781073775676879611190785715 | sparse_tensor_dense_add_op.cc | 91198918327439956509177796541242214319 | CWE-20 | CVE-2022-29206 | TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.SparseTensorDenseAdd` does not fully validate the input arguments. In this case, a reference gets bound to a `nullptr` during kernel execution. This is undefined behavior. Vers... | https://nvd.nist.gov/vuln/detail/CVE-2022-29206 |
242,926 | tensorflow | 11ced8467eccad9c7cb94867708be8fa5c66c730 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/11ced8467eccad9c7cb94867708be8fa5c66c730 | Fix UB in SparseTensorDenseAdd
Added more input validation to avoid nullptr dereferencing and array index
out of bounds issues.
PiperOrigin-RevId: 446192704 | 0 | Status ValidateInputs(const Tensor *a_indices, const Tensor *a_values,
const Tensor *a_shape, const Tensor *b) {
if (!TensorShapeUtils::IsMatrix(a_indices->shape())) {
return errors::InvalidArgument(
"Input a_indices should be a matrix but received shape: ",
a_indices->shape(... | 310798775905628265586866839597720584207 | sparse_tensor_dense_add_op.cc | 106434963445193170812694157920438487376 | CWE-20 | CVE-2022-29206 | TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.SparseTensorDenseAdd` does not fully validate the input arguments. In this case, a reference gets bound to a `nullptr` during kernel execution. This is undefined behavior. Vers... | https://nvd.nist.gov/vuln/detail/CVE-2022-29206 |
196,860 | gpac | a51f951b878c2b73c1d8e2f1518c7cdc5fb82c3f | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/a51f951b878c2b73c1d8e2f1518c7cdc5fb82c3f | fixed #1782 (fuzz) | 1 | GF_Err afra_box_read(GF_Box *s, GF_BitStream *bs)
{
unsigned int i;
GF_AdobeFragRandomAccessBox *ptr = (GF_AdobeFragRandomAccessBox *)s;
ISOM_DECREASE_SIZE(ptr, 9)
ptr->long_ids = gf_bs_read_int(bs, 1);
ptr->long_offsets = gf_bs_read_int(bs, 1);
ptr->global_entries = gf_bs_read_int(bs, 1);
ptr->reserved = gf_bs... | 312927211426500504617752335989791880756 | None | CWE-787 | CVE-2021-33361 | Memory leak in the afra_box_read function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2021-33361 | |
246,693 | gpac | a51f951b878c2b73c1d8e2f1518c7cdc5fb82c3f | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/a51f951b878c2b73c1d8e2f1518c7cdc5fb82c3f | fixed #1782 (fuzz) | 0 | GF_Err afra_box_read(GF_Box *s, GF_BitStream *bs)
{
unsigned int i;
GF_AdobeFragRandomAccessBox *ptr = (GF_AdobeFragRandomAccessBox *)s;
ISOM_DECREASE_SIZE(ptr, 9)
ptr->long_ids = gf_bs_read_int(bs, 1);
ptr->long_offsets = gf_bs_read_int(bs, 1);
ptr->global_entries = gf_bs_read_int(bs, 1);
ptr->reserved = gf_bs... | 301022642870722199968022360468016167215 | None | CWE-787 | CVE-2021-33361 | Memory leak in the afra_box_read function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2021-33361 | |
196,893 | envoy | e9f936d85dc1edc34fabd0a1725ec180f2316353 | https://github.com/istio/envoy | https://github.com/envoyproxy/envoy/commit/e9f936d85dc1edc34fabd0a1725ec180f2316353 | CVE-2022-21654
tls allows re-use when some cert validation settings have changed
Signed-off-by: Yan Avlasov <yavlasov@google.com> | 1 | void DefaultCertValidator::updateDigestForSessionId(bssl::ScopedEVP_MD_CTX& md,
uint8_t hash_buffer[EVP_MAX_MD_SIZE],
unsigned hash_length) {
int rc;
// Hash all the settings that affect whether the server will ... | 140411723524972581248505271605198365196 | default_validator.cc | 12469299547216327731154844869138538271 | CWE-362 | CVE-2022-21654 | Envoy is an open source edge and service proxy, designed for cloud-native applications. Envoy's tls allows re-use when some cert validation settings have changed from their default configuration. The only workaround for this issue is to ensure that default tls settings are used. Users are advised to upgrade. | https://nvd.nist.gov/vuln/detail/CVE-2022-21654 |
247,550 | envoy | e9f936d85dc1edc34fabd0a1725ec180f2316353 | https://github.com/istio/envoy | https://github.com/envoyproxy/envoy/commit/e9f936d85dc1edc34fabd0a1725ec180f2316353 | CVE-2022-21654
tls allows re-use when some cert validation settings have changed
Signed-off-by: Yan Avlasov <yavlasov@google.com> | 0 | void DefaultCertValidator::updateDigestForSessionId(bssl::ScopedEVP_MD_CTX& md,
uint8_t hash_buffer[EVP_MAX_MD_SIZE],
unsigned hash_length) {
int rc;
// Hash all the settings that affect whether the server will ... | 325686322374262257116614301181972043862 | default_validator.cc | 261316308158712382898480668520478060002 | CWE-362 | CVE-2022-21654 | Envoy is an open source edge and service proxy, designed for cloud-native applications. Envoy's tls allows re-use when some cert validation settings have changed from their default configuration. The only workaround for this issue is to ensure that default tls settings are used. Users are advised to upgrade. | https://nvd.nist.gov/vuln/detail/CVE-2022-21654 |
197,111 | tinyexr | a685e3332f61cd4e59324bf3f669d36973d64270 | https://github.com/syoyo/tinyexr | https://github.com/syoyo/tinyexr/commit/a685e3332f61cd4e59324bf3f669d36973d64270 | Make line_no with too large value(2**20) invalid. Fixes #124 | 1 | static int DecodeChunk(EXRImage *exr_image, const EXRHeader *exr_header,
const std::vector<tinyexr::tinyexr_uint64> &offsets,
const unsigned char *head, const size_t size,
std::string *err) {
int num_channels = exr_header->num_channels;
int num_s... | 204576660378471471312302041175468111939 | tinyexr.h | 28581937103314011160798682220091501322 | CWE-20 | CVE-2020-19490 | tinyexr 0.9.5 has a integer overflow over-write in tinyexr::DecodePixelData in tinyexr.h, related to OpenEXR code. | https://nvd.nist.gov/vuln/detail/CVE-2020-19490 |
252,437 | tinyexr | a685e3332f61cd4e59324bf3f669d36973d64270 | https://github.com/syoyo/tinyexr | https://github.com/syoyo/tinyexr/commit/a685e3332f61cd4e59324bf3f669d36973d64270 | Make line_no with too large value(2**20) invalid. Fixes #124 | 0 | static int DecodeChunk(EXRImage *exr_image, const EXRHeader *exr_header,
const std::vector<tinyexr::tinyexr_uint64> &offsets,
const unsigned char *head, const size_t size,
std::string *err) {
int num_channels = exr_header->num_channels;
int num_s... | 151063885227112731774220545683650954280 | tinyexr.h | 117099710183052888477970990927407043374 | CWE-20 | CVE-2020-19490 | tinyexr 0.9.5 has a integer overflow over-write in tinyexr::DecodePixelData in tinyexr.h, related to OpenEXR code. | https://nvd.nist.gov/vuln/detail/CVE-2020-19490 |
197,128 | mruby | f72315575f78a9a773adbce0ee7d3ec33434cb76 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/f72315575f78a9a773adbce0ee7d3ec33434cb76 | codegen.c: fix a argument generation bug in array assignment. | 1 | gen_assignment(codegen_scope *s, node *tree, node *rhs, int sp, int val)
{
int idx;
int type = nint(tree->car);
switch (type) {
case NODE_GVAR:
case NODE_ARG:
case NODE_LVAR:
case NODE_IVAR:
case NODE_CVAR:
case NODE_CONST:
case NODE_NIL:
case NODE_MASGN:
if (rhs) {
codegen(s, rhs, VAL)... | 236078569306136776334536654321578023921 | codegen.c | 69656694646846748382204460208931803734 | CWE-125 | CVE-2022-0717 | Out-of-bounds Read in GitHub repository mruby/mruby prior to 3.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-0717 |
253,515 | mruby | f72315575f78a9a773adbce0ee7d3ec33434cb76 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/f72315575f78a9a773adbce0ee7d3ec33434cb76 | codegen.c: fix a argument generation bug in array assignment. | 0 | gen_assignment(codegen_scope *s, node *tree, node *rhs, int sp, int val)
{
int idx;
int type = nint(tree->car);
switch (type) {
case NODE_GVAR:
case NODE_ARG:
case NODE_LVAR:
case NODE_IVAR:
case NODE_CVAR:
case NODE_CONST:
case NODE_NIL:
case NODE_MASGN:
if (rhs) {
codegen(s, rhs, VAL)... | 24141483316666647152319474982009169945 | None | CWE-125 | CVE-2022-0717 | Out-of-bounds Read in GitHub repository mruby/mruby prior to 3.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-0717 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.