ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
OSS-Fuzz
OSV-2020-110
Heap-buffer-overflow in parquet::internal::RecordReader::Make
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20989 ``` Crash type: Heap-buffer-overflow READ 8 Crash state: parquet::internal::RecordReader::Make parquet::arrow::LeafReader::LeafReader parquet::arrow::GetReader ```
null
2022-04-13T03:04:32.083138Z
2020-06-24T01:51:14.532580Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20989', 'https://github.com/apache/arrow/commit/6b87c6c9fb00ade7eff909afa4a6a61464cd516c'}
{'https://github.com/apache/arrow/commit/431fdbfbc0fb4bb16c4a89298404ad16784db2a0'}
{'https://github.com/apache/arrow/commit/6b87c6c9fb00ade7eff909afa4a6a61464cd516c'}
{'https://github.com/apache/arrow/commit/6b87c6c9fb00ade7eff909afa4a6a61464cd516c'}
OSS-Fuzz
OSV-2020-76
Heap-use-after-free in pixAverageRasterScans
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22760 ``` Crash type: Heap-use-after-free READ 1 Crash state: pixAverageRasterScans pixExtractBarcodeCrossings pixExtractBarcodeWidths1 ```
null
2022-04-13T03:04:32.704451Z
2020-06-24T01:51:13.003871Z
HIGH
null
null
{'https://github.com/DanBloomberg/leptonica/commit/7b5ba2afc759b7a44f6776a53030b494c6d985c3', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22760'}
{'https://github.com/DanBloomberg/leptonica/commit/f053b173bc94ef35a99ddf8eb608f63ae794b5fa'}
{'https://github.com/DanBloomberg/leptonica/commit/7b5ba2afc759b7a44f6776a53030b494c6d985c3'}
{'https://github.com/DanBloomberg/leptonica/commit/7b5ba2afc759b7a44f6776a53030b494c6d985c3'}
OSS-Fuzz
OSV-2020-405
Stack-buffer-overflow in ZSTD_decodeLiteralsBlock
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16445 ``` Crash type: Stack-buffer-overflow WRITE {*} Crash state: ZSTD_decodeLiteralsBlock ZSTD_decompressBlock ZSTD_decompressDCtx ```
null
2022-04-13T03:19:42.457329Z
2020-07-01T00:00:07.677115Z
HIGH
null
null
{'https://github.com/facebook/zstd/commit/a42bbb4e058063be8b61b3e00306eb6fb886a836', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16445'}
{'https://github.com/facebook/zstd/commit/610a81ecf9593893ed2f69718d3ecbd234297804'}
{'https://github.com/facebook/zstd/commit/a42bbb4e058063be8b61b3e00306eb6fb886a836'}
{'https://github.com/facebook/zstd/commit/a42bbb4e058063be8b61b3e00306eb6fb886a836'}
OSS-Fuzz
OSV-2021-1311
Null-dereference READ in unzOpenCurrentFile3
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38873 ``` Crash type: Null-dereference READ Crash state: unzOpenCurrentFile3 unzOpenCurrentFile Assimp::ZipFileInfo::Extract ```
null
2022-04-13T03:04:42.679623Z
2021-09-18T00:00:37.776159Z
null
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38873', 'https://github.com/assimp/assimp/commit/310c81aaa20b7328ce7a354897db817f8becac3a'}
{'https://github.com/assimp/assimp/commit/8a975549a99bd21b7a2c09cc37b73e52a3919fed'}
{'https://github.com/assimp/assimp/commit/310c81aaa20b7328ce7a354897db817f8becac3a'}
{'https://github.com/assimp/assimp/commit/310c81aaa20b7328ce7a354897db817f8becac3a'}
OSS-Fuzz
OSV-2018-156
Heap-buffer-overflow in dotnet_parse_us
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11945 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: dotnet_parse_us dotnet_parse_com dotnet__load ```
null
2022-04-13T03:04:42.270609Z
2021-01-13T00:01:07.126725Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11945', 'https://github.com/VirusTotal/yara/commit/7493247020e24407f120b6b29f6dd43c883e2f21'}
{'https://github.com/VirusTotal/yara/commit/aa182b4f928e54189fe51606d4dc419e7b27022f'}
{'https://github.com/VirusTotal/yara/commit/7493247020e24407f120b6b29f6dd43c883e2f21'}
{'https://github.com/VirusTotal/yara/commit/7493247020e24407f120b6b29f6dd43c883e2f21'}
OSS-Fuzz
OSV-2020-956
Heap-buffer-overflow in ndpi_workflow_process_packet
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20644 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: ndpi_workflow_process_packet fuzz_ndpi_reader.c HonggfuzzPersistentLoop ```
null
2022-04-13T03:04:35.902440Z
2020-07-22T00:00:25.708813Z
MEDIUM
null
null
{'https://github.com/ntop/nDPI/commit/bf7dcd63c3a663cd0e1e8c567511ccfd8047d24a', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20644'}
{'https://github.com/ntop/nDPI/commit/98d9f524f9ff7746d0345939fe543020f8057212'}
{'https://github.com/ntop/nDPI/commit/bf7dcd63c3a663cd0e1e8c567511ccfd8047d24a'}
{'https://github.com/ntop/nDPI/commit/bf7dcd63c3a663cd0e1e8c567511ccfd8047d24a'}
OSS-Fuzz
OSV-2020-1423
Use-of-uninitialized-value in txt2sd
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22219 ``` Crash type: Use-of-uninitialized-value Crash state: txt2sd fuzz_mdns_xht.cc txt2sd ```
null
2022-04-15T00:06:34.889356Z
2020-07-28T00:00:16.191970Z
MEDIUM
null
null
{'https://github.com/open62541/open62541/commit/6f21ecb48a49fd292d568feb3751a50e51e083a3', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22219'}
{'https://github.com/open62541/open62541/commit/2919785d72474ed553317c4f3bafadf3e8c027f2', 'https://github.com/open62541/open62541/commit/798210374ad7a5fd43b31fc3c178a34a3ac21a0c'}
{'https://github.com/open62541/open62541/commit/6f21ecb48a49fd292d568feb3751a50e51e083a3'}
{'https://github.com/open62541/open62541/commit/6f21ecb48a49fd292d568feb3751a50e51e083a3'}
OSS-Fuzz
OSV-2020-8
Heap-buffer-overflow in findNextBorderPixel
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23433 ``` Crash type: Heap-buffer-overflow READ 4 Crash state: findNextBorderPixel pixGetHoleBorder pixGetCCBorders ```
null
2022-04-13T03:04:32.639074Z
2020-06-24T01:51:09.673990Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23433', 'https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842'}
{'https://github.com/DanBloomberg/leptonica/commit/a53cfc7bd554dc4c2644b8f27ac5296fd926725f'}
{'https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842'}
{'https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842'}
OSS-Fuzz
OSV-2021-242
Heap-buffer-overflow in rans_uncompress_to_4x16
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29939 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: rans_uncompress_to_4x16 rans_decode uncompress ```
null
2022-04-13T03:04:32.338631Z
2021-01-26T23:45:33.235035Z
MEDIUM
null
null
{'https://github.com/samtools/htslib/commit/9d9e60c83487a8ac4644079e9636e34a9dd4bb08', 'https://github.com/samtools/htslib/commit/b8dcbd12b2c535fb792a5dfb275e875b626e929d', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29939'}
{'https://github.com/samtools/htslib/commit/0d1971cbebb269d90a563464e4f56987290e20ab'}
{'https://github.com/samtools/htslib/commit/9d9e60c83487a8ac4644079e9636e34a9dd4bb08', 'https://github.com/samtools/htslib/commit/b8dcbd12b2c535fb792a5dfb275e875b626e929d'}
{'https://github.com/samtools/htslib/commit/9d9e60c83487a8ac4644079e9636e34a9dd4bb08', 'https://github.com/samtools/htslib/commit/b8dcbd12b2c535fb792a5dfb275e875b626e929d'}
OSS-Fuzz
OSV-2020-2018
Heap-use-after-free in fpixChangeRefcount
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26260 ``` Crash type: Heap-use-after-free READ 4 Crash state: fpixChangeRefcount fpixDestroy fpix2_fuzzer.cc ```
null
2022-04-13T03:04:32.714945Z
2020-10-12T00:00:40.582555Z
HIGH
null
null
{'https://github.com/DanBloomberg/leptonica/commit/7d0c940768fa3f7d07396dbae1d668cfded6bf05', 'https://github.com/DanBloomberg/leptonica/commit/20b8d16e4f3fa4d94b606a7f7804ee56c776768b', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26260'}
{'https://github.com/DanBloomberg/leptonica/commit/ef35b298c87cee04bf35dac4bc7c8c489d26fbc4'}
{'https://github.com/DanBloomberg/leptonica/commit/7d0c940768fa3f7d07396dbae1d668cfded6bf05', 'https://github.com/DanBloomberg/leptonica/commit/20b8d16e4f3fa4d94b606a7f7804ee56c776768b'}
{'https://github.com/DanBloomberg/leptonica/commit/7d0c940768fa3f7d07396dbae1d668cfded6bf05', 'https://github.com/DanBloomberg/leptonica/commit/20b8d16e4f3fa4d94b606a7f7804ee56c776768b'}
OSS-Fuzz
OSV-2020-612
Use-of-uninitialized-value in std::__1::vector<std::__1::vector<Sass::SharedImpl<Sass::ComplexSelector>, std::
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18066 ``` Crash type: Use-of-uninitialized-value Crash state: std::__1::vector<std::__1::vector<Sass::SharedImpl<Sass::ComplexSelector>, std:: Sass::ComplexSelector::resolve_parent_refs Sass::Eval::operator ```
null
2022-04-13T03:04:38.465562Z
2020-07-01T00:00:20.375619Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18066', 'https://github.com/sass/libsass/commit/4c83fdb0fe90432cc9b778d816ffd6859e34ef2d'}
{'https://github.com/sass/libsass/commit/f964dcddd76f4c1f00da06bfd905be790618c33b'}
{'https://github.com/sass/libsass/commit/4c83fdb0fe90432cc9b778d816ffd6859e34ef2d'}
{'https://github.com/sass/libsass/commit/4c83fdb0fe90432cc9b778d816ffd6859e34ef2d'}
OSS-Fuzz
OSV-2020-242
Heap-buffer-overflow in ndpi_workflow_process_packet
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20089 ``` Crash type: Heap-buffer-overflow READ 2 Crash state: ndpi_workflow_process_packet fuzz_ndpi_reader.c ```
null
2022-04-13T03:04:36.221336Z
2020-06-26T00:00:09.227452Z
MEDIUM
null
null
{'https://github.com/ntop/nDPI/commit/812505b56bb4508bc42e1615d6425ad26444d3f8', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20089'}
{'https://github.com/ntop/nDPI/commit/10738a0ca334104377e19a1e683bd13f2451a9e2'}
{'https://github.com/ntop/nDPI/commit/812505b56bb4508bc42e1615d6425ad26444d3f8'}
{'https://github.com/ntop/nDPI/commit/812505b56bb4508bc42e1615d6425ad26444d3f8'}
OSS-Fuzz
OSV-2021-1805
Heap-buffer-overflow in ndpi_search_kerberos
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43925 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: ndpi_search_kerberos check_ndpi_detection_func ndpi_check_flow_func ```
null
2022-04-13T03:04:36.014290Z
2022-01-23T00:00:37.838585Z
MEDIUM
null
null
{'https://github.com/ntop/nDPI/commit/9dcc4a2334fa10d7d0a3c019ee35dfde4c06e044', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43925'}
{'https://github.com/ntop/nDPI/commit/ed51987e3a4838dd9aef27dfab2c0651f2f52836'}
{'https://github.com/ntop/nDPI/commit/9dcc4a2334fa10d7d0a3c019ee35dfde4c06e044'}
{'https://github.com/ntop/nDPI/commit/9dcc4a2334fa10d7d0a3c019ee35dfde4c06e044'}
OSS-Fuzz
OSV-2020-307
Heap-buffer-overflow in spng_decode_image
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16830 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: spng_decode_image spng_read_fuzzer.cc ```
null
2022-04-13T03:04:33.693276Z
2020-06-30T00:00:49.046191Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16830', 'https://github.com/randy408/libspng/commit/d7d4cced14f6107d05b52b5e7758207f79aa3465'}
{'https://github.com/randy408/libspng/commit/d48a9fa212cee4c05c51178b9c7813cd1299dcb3'}
{'https://github.com/randy408/libspng/commit/d7d4cced14f6107d05b52b5e7758207f79aa3465'}
{'https://github.com/randy408/libspng/commit/d7d4cced14f6107d05b52b5e7758207f79aa3465'}
OSS-Fuzz
OSV-2021-1413
UNKNOWN READ in helper_uc_tracecode
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39559 ``` Crash type: UNKNOWN READ Crash state: helper_uc_tracecode ```
null
2022-04-13T03:26:07.599894Z
2021-10-05T00:01:45.386128Z
MEDIUM
null
null
{'https://github.com/unicorn-engine/unicorn/commit/3fadb5aa5aad22926f5f816dbe396f8661990374', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39559'}
{'https://github.com/unicorn-engine/unicorn/commit/34ddafcbcf6d16508a63623a68715394ea4e12d8'}
{'https://github.com/unicorn-engine/unicorn/commit/3fadb5aa5aad22926f5f816dbe396f8661990374'}
{'https://github.com/unicorn-engine/unicorn/commit/3fadb5aa5aad22926f5f816dbe396f8661990374'}
OSS-Fuzz
OSV-2021-757
Use-of-uninitialized-value in nn_check_initialized
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34156 ``` Crash type: Use-of-uninitialized-value Crash state: nn_check_initialized nn_zero ecgdsa_sign_raw ```
null
2022-04-13T03:04:31.416903Z
2021-05-12T00:01:05.638739Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34156', 'https://github.com/ANSSI-FR/libecc/commit/d6cbbbb0c4afb6097dfea9eadf1516759dd337eb'}
{'https://github.com/ANSSI-FR/libecc/commit/f3abf297e84874278129fb91bc1b89356dd66627'}
{'https://github.com/ANSSI-FR/libecc/commit/d6cbbbb0c4afb6097dfea9eadf1516759dd337eb'}
{'https://github.com/ANSSI-FR/libecc/commit/d6cbbbb0c4afb6097dfea9eadf1516759dd337eb'}
OSS-Fuzz
OSV-2021-307
UNKNOWN READ in cpu_arm_exec_armeb
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30444 ``` Crash type: UNKNOWN READ Crash state: cpu_arm_exec_armeb resume_all_vcpus_armeb vm_start_armeb ```
null
2022-04-13T03:27:15.927960Z
2021-02-08T00:00:08.491999Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30444', 'https://github.com/unicorn-engine/unicorn/commit/7ca7e8a79d85ca57bb523be49009b0326b7a5210', 'https://github.com/unicorn-engine/unicorn/commit/e2a924a32b6fd3f24163b93996ac91782f518a25', 'https://github.com/unicorn-engine/unicorn/commit/34ddafcbcf6d16508a63623a68715394ea4e12d8'}
{'https://github.com/unicorn-engine/unicorn/commit/07f94ad1fc62293cac330df9714d739be6354926'}
{'https://github.com/unicorn-engine/unicorn/commit/34ddafcbcf6d16508a63623a68715394ea4e12d8', 'https://github.com/unicorn-engine/unicorn/commit/e2a924a32b6fd3f24163b93996ac91782f518a25', 'https://github.com/unicorn-engine/unicorn/commit/7ca7e8a79d85ca57bb523be49009b0326b7a5210'}
{'https://github.com/unicorn-engine/unicorn/commit/7ca7e8a79d85ca57bb523be49009b0326b7a5210', 'https://github.com/unicorn-engine/unicorn/commit/34ddafcbcf6d16508a63623a68715394ea4e12d8', 'https://github.com/unicorn-engine/unicorn/commit/e2a924a32b6fd3f24163b93996ac91782f518a25'}
OSS-Fuzz
OSV-2020-1321
UNKNOWN READ in FlowGetHash
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21479 ``` Crash type: UNKNOWN READ Crash state: FlowGetHash FlowSetupPacket DecodeICMPV4 ```
null
2022-04-13T03:04:32.748792Z
2020-07-22T21:50:06.291563Z
MEDIUM
null
null
{'https://github.com/OISF/suricata/commit/8cbae1371f18d1427244f18fe2110256496a9f9f', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21479'}
{'https://github.com/OISF/suricata/commit/19fe8d9894207f18dbd305a5834820f3a698dc32'}
{'https://github.com/OISF/suricata/commit/8cbae1371f18d1427244f18fe2110256496a9f9f'}
{'https://github.com/OISF/suricata/commit/8cbae1371f18d1427244f18fe2110256496a9f9f'}
OSS-Fuzz
OSV-2018-64
Heap-buffer-overflow in BEInt<unsigned int, 4>::operator unsigned int
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11522 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: BEInt<unsigned int, 4>::operator unsigned int void hb_sanitize_context_t::set_object<OT::KernSubTable<OT::KernAATSubTableHeade AAT::KerxTable<OT::KernAAT>::sanitize ```
null
2022-04-13T03:04:32.803589Z
2021-01-13T00:00:31.625117Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11522', 'https://github.com/harfbuzz/harfbuzz/commit/8dcc1913a1670ede7b124f7b5b775d7ab8791386'}
{'https://github.com/harfbuzz/harfbuzz/commit/758c9d68e2143493978d8ac8391f4af2a2abc26a'}
{'https://github.com/harfbuzz/harfbuzz/commit/8dcc1913a1670ede7b124f7b5b775d7ab8791386'}
{'https://github.com/harfbuzz/harfbuzz/commit/8dcc1913a1670ede7b124f7b5b775d7ab8791386'}
OSS-Fuzz
OSV-2020-184
Heap-buffer-overflow in file_strncmp
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23044 ``` Crash type: Heap-buffer-overflow READ 13 Crash state: file_strncmp magiccheck match ```
null
2022-04-13T03:04:30.870815Z
2020-06-24T01:51:17.908691Z
MEDIUM
null
null
{'https://github.com/file/file/commit/3c6b51d4a1f5682f8144fef1553b0357d3d83aaf', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23044'}
{'https://github.com/file/file/commit/020876142969029eefc7a52d5545d0475203c472'}
{'https://github.com/file/file/commit/3c6b51d4a1f5682f8144fef1553b0357d3d83aaf'}
{'https://github.com/file/file/commit/3c6b51d4a1f5682f8144fef1553b0357d3d83aaf'}
OSS-Fuzz
OSV-2021-887
Use-after-poison in AK::RefPtr<AK::StringImpl, AK::RefPtrTraits<AK::StringImpl> >::RefPtr
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35436 ``` Crash type: Use-after-poison WRITE 8 Crash state: AK::RefPtr<AK::StringImpl, AK::RefPtrTraits<AK::StringImpl> >::RefPtr AK::String::String JS::abstract_relation ```
null
2022-04-13T03:04:32.211472Z
2021-06-22T00:01:25.243822Z
HIGH
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35436', 'https://github.com/SerenityOS/serenity/commit/5d24b5f4bec315cba22746f8a0985b1c0877a315'}
{'https://github.com/SerenityOS/serenity/commit/c31392510aa21d3ce5000f19a12dcf43abf9613d'}
{'https://github.com/SerenityOS/serenity/commit/5d24b5f4bec315cba22746f8a0985b1c0877a315'}
{'https://github.com/SerenityOS/serenity/commit/5d24b5f4bec315cba22746f8a0985b1c0877a315'}
OSS-Fuzz
OSV-2020-2274
Heap-buffer-overflow in McCopyWidthEq4_c
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28769 ``` Crash type: Heap-buffer-overflow READ 4 Crash state: McCopyWidthEq4_c McCopy_sse2 McChroma_ssse3 ```
null
2022-04-13T03:04:37.647508Z
2020-12-19T00:00:41.113564Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28769', 'https://github.com/cisco/openh264/commit/f15f940425eebf24ce66984db2445733cf500b7b', 'https://github.com/cisco/openh264/commit/992c1c147175126c3fe7ab78216aa0395f9e6c71'}
{'https://github.com/cisco/openh264/commit/66ef706acd55b0b8daec32ca299d2586a1f473c9'}
{'https://github.com/cisco/openh264/commit/992c1c147175126c3fe7ab78216aa0395f9e6c71', 'https://github.com/cisco/openh264/commit/f15f940425eebf24ce66984db2445733cf500b7b'}
{'https://github.com/cisco/openh264/commit/f15f940425eebf24ce66984db2445733cf500b7b', 'https://github.com/cisco/openh264/commit/992c1c147175126c3fe7ab78216aa0395f9e6c71'}
OSS-Fuzz
OSV-2021-1385
Heap-buffer-overflow in Assimp::BaseImporter::ConvertToUTF8
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39339 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: Assimp::BaseImporter::ConvertToUTF8 Assimp::BaseImporter::TextFileToBuffer Assimp::OpenGEX::OpenGEXImporter::InternReadFile ```
null
2022-04-13T03:04:42.673761Z
2021-09-28T00:00:07.486971Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39339', 'https://github.com/assimp/assimp/commit/215f4e1f4dcca57f1dee9f18519df1af659ad62c'}
{'https://github.com/assimp/assimp/commit/8a975549a99bd21b7a2c09cc37b73e52a3919fed'}
{'https://github.com/assimp/assimp/commit/215f4e1f4dcca57f1dee9f18519df1af659ad62c'}
{'https://github.com/assimp/assimp/commit/215f4e1f4dcca57f1dee9f18519df1af659ad62c'}
OSS-Fuzz
OSV-2021-868
Heap-buffer-overflow in ndpi_set_detected_protocol
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35288 ``` Crash type: Heap-buffer-overflow READ 4 Crash state: ndpi_set_detected_protocol ndpi_match_hostname_protocol processClientServerHello ```
null
2022-04-13T03:04:36.145859Z
2021-06-18T00:00:07.405397Z
MEDIUM
null
null
{'https://github.com/ntop/nDPI/commit/b0b3e1bc6c8db7cf8a2a26dbb29ffdb057d86121', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35288'}
{'https://github.com/ntop/nDPI/commit/be808c30f3f4582009df4c5efccd4f3bb0c6ef1d'}
{'https://github.com/ntop/nDPI/commit/b0b3e1bc6c8db7cf8a2a26dbb29ffdb057d86121'}
{'https://github.com/ntop/nDPI/commit/b0b3e1bc6c8db7cf8a2a26dbb29ffdb057d86121'}
OSS-Fuzz
OSV-2020-1233
Heap-buffer-overflow in getTLScertificate
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=19269 ``` Crash type: Heap-buffer-overflow READ 6 Crash state: getTLScertificate tlsDetectProtocolFromCertificate ndpi_search_tls_tcp_udp ```
null
2022-04-13T03:04:36.352534Z
2020-07-22T21:49:58.860561Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=19269', 'https://github.com/ntop/nDPI/commit/6d7f3976f33b0d4fbbece60d6b7d549b13107674'}
{'https://github.com/ntop/nDPI/commit/e695dd6eade754b2d50bdf297ca8bdc4105f93ff'}
{'https://github.com/ntop/nDPI/commit/6d7f3976f33b0d4fbbece60d6b7d549b13107674'}
{'https://github.com/ntop/nDPI/commit/6d7f3976f33b0d4fbbece60d6b7d549b13107674'}
OSS-Fuzz
OSV-2021-700
UNKNOWN READ in ReadLEB_u32
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33749 ``` Crash type: UNKNOWN READ Crash state: ReadLEB_u32 InitElements Compile_ExtendedOpcode ```
null
2022-04-13T03:04:30.651451Z
2021-04-29T00:00:12.162949Z
MEDIUM
null
null
{'https://github.com/wasm3/wasm3/commit/6bb612ccbfd5f8993a07a99092fab534722df1c3', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33749'}
{'https://github.com/wasm3/wasm3/commit/8cb2fd424309fa6ff70cf00bfcedc4e66d3355c0'}
{'https://github.com/wasm3/wasm3/commit/6bb612ccbfd5f8993a07a99092fab534722df1c3'}
{'https://github.com/wasm3/wasm3/commit/6bb612ccbfd5f8993a07a99092fab534722df1c3'}
OSS-Fuzz
OSV-2020-700
Stack-buffer-overflow in ot::Message::Write
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15380 ``` Crash type: Stack-buffer-overflow READ {*} Crash state: ot::Message::Write ot::Message::Append ot::Mle::Mle::AppendResponse ```
null
2022-04-13T03:04:38.888636Z
2020-07-01T00:00:25.618153Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15380', 'https://github.com/openthread/openthread/commit/8224b3c49f8bd285ad5658c1b3cd9683d6627bdb'}
{'https://github.com/openthread/openthread/commit/b694b00951eeeb4986387de1179d55dd38643a87'}
{'https://github.com/openthread/openthread/commit/8224b3c49f8bd285ad5658c1b3cd9683d6627bdb'}
{'https://github.com/openthread/openthread/commit/8224b3c49f8bd285ad5658c1b3cd9683d6627bdb'}
OSS-Fuzz
OSV-2021-429
Heap-buffer-overflow in blosc_d
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31170 ``` Crash type: Heap-buffer-overflow READ 4 Crash state: blosc_d _blosc_getitem blosc2_getitem_ctx ```
null
2022-04-13T03:04:40.451804Z
2021-02-22T00:00:20.030600Z
HIGH
null
null
{'https://github.com/Blosc/c-blosc2/commit/cb44cf0fc82cf19efb002bba0eb5cc42e9527c3f', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31170'}
{'https://github.com/Blosc/c-blosc2/commit/861ba79f31393dec0a0782ca11cf32cebb6f6610'}
{'https://github.com/Blosc/c-blosc2/commit/cb44cf0fc82cf19efb002bba0eb5cc42e9527c3f'}
{'https://github.com/Blosc/c-blosc2/commit/cb44cf0fc82cf19efb002bba0eb5cc42e9527c3f'}
OSS-Fuzz
OSV-2020-429
Heap-buffer-overflow in MEM_read32
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14368 ``` Crash type: Heap-buffer-overflow READ 4 Crash state: MEM_read32 ZSTDv05_decodeSequence ZSTDv05_decompressSequences ```
null
2022-04-13T03:04:31.653842Z
2020-07-01T00:00:08.999234Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14368', 'https://github.com/facebook/zstd/commit/0fd322f812211e653a83492c0c114b933f8b6bc5'}
{'https://github.com/facebook/zstd/commit/610a81ecf9593893ed2f69718d3ecbd234297804'}
{'https://github.com/facebook/zstd/commit/0fd322f812211e653a83492c0c114b933f8b6bc5'}
{'https://github.com/facebook/zstd/commit/0fd322f812211e653a83492c0c114b933f8b6bc5'}
OSS-Fuzz
OSV-2018-33
Heap-buffer-overflow in yr_object_set_string
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14560 ``` Crash type: Heap-buffer-overflow READ {*} Crash state: yr_object_set_string dotnet_parse_us dotnet_parse_com ```
null
2022-04-13T03:04:42.242196Z
2021-01-13T00:00:14.651679Z
MEDIUM
null
null
{'https://github.com/VirusTotal/yara/commit/e83662f85c6f9534dc19e1a0cede55bebc64f21f', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14560'}
{'https://github.com/VirusTotal/yara/commit/aa182b4f928e54189fe51606d4dc419e7b27022f'}
{'https://github.com/VirusTotal/yara/commit/e83662f85c6f9534dc19e1a0cede55bebc64f21f'}
{'https://github.com/VirusTotal/yara/commit/e83662f85c6f9534dc19e1a0cede55bebc64f21f'}
OSS-Fuzz
OSV-2022-67
Heap-buffer-overflow in cli_bcomp_freemeta
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43816 ``` Crash type: Heap-buffer-overflow READ 8 Crash state: cli_bcomp_freemeta cli_bcomp_addpatt cli_parse_add ```
null
2022-04-13T03:04:39.425407Z
2022-01-21T00:00:45.048694Z
MEDIUM
null
null
{'https://github.com/Cisco-Talos/clamav/commit/618e3b6bcfc2867a713d29a0696d9b87be197ed6', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43816'}
{'https://github.com/Cisco-Talos/clamav/commit/0037f5825b0b17a789c7eb29c9cb9a2d39c452bc'}
{'https://github.com/Cisco-Talos/clamav/commit/618e3b6bcfc2867a713d29a0696d9b87be197ed6'}
{'https://github.com/Cisco-Talos/clamav/commit/618e3b6bcfc2867a713d29a0696d9b87be197ed6'}
OSS-Fuzz
OSV-2020-1819
Heap-buffer-overflow in void cv::copyToMat<int>
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25779 ``` Crash type: Heap-buffer-overflow READ 4 Crash state: void cv::copyToMat<int> cv::decodeSRGBData cv::Jpeg2KOpjDecoder::readData ```
null
2022-04-13T03:04:31.501046Z
2020-09-21T00:00:12.969129Z
MEDIUM
null
null
{'https://github.com/opencv/opencv/commit/f7b8f522ff4084d584628811a02a621736c3a731', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25779'}
{'https://github.com/opencv/opencv/commit/bfd056ceb1ad6529e1a2103f60e6f089c6b70109'}
{'https://github.com/opencv/opencv/commit/f7b8f522ff4084d584628811a02a621736c3a731'}
{'https://github.com/opencv/opencv/commit/f7b8f522ff4084d584628811a02a621736c3a731'}
OSS-Fuzz
OSV-2018-195
Heap-buffer-overflow in gmp_emsa_pkcs1_signature_data
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=10671 ``` Crash type: Heap-buffer-overflow WRITE 1 Crash state: gmp_emsa_pkcs1_signature_data verify_emsa_pkcs1_signature verify ```
null
2022-04-13T03:04:34.061437Z
2021-01-13T00:01:21.218732Z
HIGH
null
null
{'https://github.com/strongswan/strongswan/commit/129ab919a8c3abfc17bea776f0774e0ccf33ca09', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=10671'}
{'https://github.com/strongswan/strongswan/commit/5955db5b124a1ee5f44c0845b6e00c86fddae67c'}
{'https://github.com/strongswan/strongswan/commit/129ab919a8c3abfc17bea776f0774e0ccf33ca09'}
{'https://github.com/strongswan/strongswan/commit/129ab919a8c3abfc17bea776f0774e0ccf33ca09'}
OSS-Fuzz
OSV-2017-154
Heap-buffer-overflow in TetrahedralInterpFloat
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=852 ``` Crash type: Heap-buffer-overflow READ 4 Crash state: TetrahedralInterpFloat _LUTeval16 CachedXFORM ```
null
2022-04-13T03:04:33.907967Z
2021-01-15T00:01:25.369737Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=852', 'https://github.com/mm2/Little-CMS/commit/76d1dccf3e5ce0c67125964d0908b322e7d1afb9'}
{'https://github.com/mm2/Little-CMS/commit/46a9220375da02b179bb6c0314b5cef40a433792'}
{'https://github.com/mm2/Little-CMS/commit/76d1dccf3e5ce0c67125964d0908b322e7d1afb9'}
{'https://github.com/mm2/Little-CMS/commit/76d1dccf3e5ce0c67125964d0908b322e7d1afb9'}
OSS-Fuzz
OSV-2021-1452
Heap-buffer-overflow in mrb_funcall_with_block
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39937 ``` Crash type: Heap-buffer-overflow WRITE 8 Crash state: mrb_funcall_with_block mrb_instance_new mrb_funcall_with_block ```
null
2022-04-13T03:04:39.698442Z
2021-10-15T00:00:40.001741Z
HIGH
null
null
{'https://github.com/mruby/mruby/commit/7010ed0f0a414b1367e4620a504f106759341cc2', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39937'}
{'https://github.com/mruby/mruby/commit/dccd66f9efecd0a974b735c62836fe566015cf37'}
{'https://github.com/mruby/mruby/commit/7010ed0f0a414b1367e4620a504f106759341cc2'}
{'https://github.com/mruby/mruby/commit/7010ed0f0a414b1367e4620a504f106759341cc2'}
OSS-Fuzz
OSV-2020-1730
Bad-cast to RDKit::Atom
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25547 ``` Crash type: Bad-cast Crash state: Bad-cast to RDKit::Atom ```
null
2022-04-13T03:04:41.515246Z
2020-09-11T00:00:51.334144Z
HIGH
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25547', 'https://github.com/rdkit/rdkit/commit/759b7a4b603c8a3c4bbb8bc31594bbab501094e3'}
{'https://github.com/rdkit/rdkit/commit/a9010da8a4af17479c706f2cf4e8c6acdc1585ce'}
{'https://github.com/rdkit/rdkit/commit/759b7a4b603c8a3c4bbb8bc31594bbab501094e3'}
{'https://github.com/rdkit/rdkit/commit/759b7a4b603c8a3c4bbb8bc31594bbab501094e3'}
OSS-Fuzz
OSV-2020-1049
Heap-use-after-free in WelsDec::WelsReorderRefList
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14027 ``` Crash type: Heap-use-after-free READ 4 Crash state: WelsDec::WelsReorderRefList WelsDec::InitRefPicList WelsDec::DecodeCurrentAccessUnit ```
null
2022-04-13T03:04:37.547498Z
2020-07-22T21:49:43.177956Z
HIGH
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14027', 'https://github.com/cisco/openh264/commit/519b0ff554e9713198bc3b3185da809be42be20c'}
{'https://github.com/cisco/openh264/commit/70eeb783515dbfee3e0c781d6667838caba5113b'}
{'https://github.com/cisco/openh264/commit/519b0ff554e9713198bc3b3185da809be42be20c'}
{'https://github.com/cisco/openh264/commit/519b0ff554e9713198bc3b3185da809be42be20c'}
OSS-Fuzz
OSV-2020-829
Heap-use-after-free in check_content_type_and_change_protocol
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23834 ``` Crash type: Heap-use-after-free READ 2 Crash state: check_content_type_and_change_protocol ndpi_check_http_tcp ndpi_search_http_tcp ```
null
2022-04-13T03:04:36.363405Z
2020-07-14T05:37:49.889652Z
HIGH
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23834', 'https://github.com/ntop/nDPI/commit/d6a97219ea14f0eb4d7d0831d4aefc971878caae'}
{'https://github.com/ntop/nDPI/commit/812505b56bb4508bc42e1615d6425ad26444d3f8'}
{'https://github.com/ntop/nDPI/commit/d6a97219ea14f0eb4d7d0831d4aefc971878caae'}
{'https://github.com/ntop/nDPI/commit/d6a97219ea14f0eb4d7d0831d4aefc971878caae'}
OSS-Fuzz
OSV-2020-254
Heap-buffer-overflow in pixReadFromTiffStream
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: pixReadFromTiffStream pixReadMemTiff pixReadMem ```
null
2022-04-13T03:04:32.633763Z
2020-06-26T00:00:11.669926Z
MEDIUM
null
null
{'https://github.com/DanBloomberg/leptonica/commit/8466a469b8c3a8d521f0fced041f8c5367eac21e', 'https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654'}
{'https://github.com/DanBloomberg/leptonica/commit/26425b91ea850552d11af0ead0557eb0a328785f'}
{'https://github.com/DanBloomberg/leptonica/commit/8466a469b8c3a8d521f0fced041f8c5367eac21e', 'https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c'}
{'https://github.com/DanBloomberg/leptonica/commit/8466a469b8c3a8d521f0fced041f8c5367eac21e', 'https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c'}
OSS-Fuzz
OSV-2017-41
Heap-buffer-overflow in OSS_FUZZ_png_combine_row
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3606 ``` Crash type: Heap-buffer-overflow WRITE 4 Crash state: OSS_FUZZ_png_combine_row OSS_FUZZ_png_read_row _start ```
null
2022-04-13T03:04:35.564255Z
2021-01-13T21:56:05.092063Z
HIGH
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3606', 'https://github.com/glennrp/libpng/commit/a3d1057a735d923626f1f6bdc0f662a13d0cba6f'}
{'https://github.com/glennrp/libpng/commit/ab791fc9d69580c1982af726c9f61b533357234f'}
{'https://github.com/glennrp/libpng/commit/a3d1057a735d923626f1f6bdc0f662a13d0cba6f'}
{'https://github.com/glennrp/libpng/commit/a3d1057a735d923626f1f6bdc0f662a13d0cba6f'}
OSS-Fuzz
OSV-2020-604
UNKNOWN READ in Sass::Parser::parseCompoundSelector
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15904 ``` Crash type: UNKNOWN READ Crash state: Sass::Parser::parseCompoundSelector Sass::Parser::parseComplexSelector Sass::Parser::parseSelectorList ```
null
2022-04-13T03:04:38.493199Z
2020-07-01T00:00:19.975718Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15904', 'https://github.com/sass/libsass/commit/994695c669085058c4a500f295a0531893eff77a'}
{'https://github.com/sass/libsass/commit/f964dcddd76f4c1f00da06bfd905be790618c33b'}
{'https://github.com/sass/libsass/commit/994695c669085058c4a500f295a0531893eff77a'}
{'https://github.com/sass/libsass/commit/994695c669085058c4a500f295a0531893eff77a'}
OSS-Fuzz
OSV-2020-1272
Heap-buffer-overflow in ASN1_get_object
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13803 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: ASN1_get_object asn1_check_tlen asn1_item_ex_d2i ```
null
2022-04-13T03:04:38.807734Z
2020-07-22T21:50:02.220943Z
MEDIUM
null
null
{'https://github.com/libressl-portable/portable/commit/2f7827344a0234320c7ad8d2fc2418e9d8a586c9', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13803'}
{'https://github.com/libressl-portable/portable/commit/4ea2a01a0d2cc889e95316f51c7a36f8f158df44'}
{'https://github.com/libressl-portable/portable/commit/2f7827344a0234320c7ad8d2fc2418e9d8a586c9'}
{'https://github.com/libressl-portable/portable/commit/2f7827344a0234320c7ad8d2fc2418e9d8a586c9'}
OSS-Fuzz
OSV-2022-318
UNKNOWN READ
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46356 ``` Crash type: UNKNOWN READ Crash state: NULL```
null
2022-04-13T03:04:38.037322Z
2022-04-07T00:01:51.631058Z
MEDIUM
null
null
{'https://github.com/libvips/libvips/commit/2dc319b1b1610e4c8ae95b8ca47b46926cd41ce1', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46356'}
{'https://github.com/libvips/libvips/commit/9228e50f46b79dc448b9416a5ae1dfdcfdfcf98c'}
{'https://github.com/libvips/libvips/commit/2dc319b1b1610e4c8ae95b8ca47b46926cd41ce1'}
{'https://github.com/libvips/libvips/commit/2dc319b1b1610e4c8ae95b8ca47b46926cd41ce1'}
OSS-Fuzz
OSV-2021-1540
Heap-buffer-overflow in consume_list
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=40723 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: consume_list pn_amqp_decode_DqEoQBIoIe pn_message_decode ```
null
2022-04-13T03:04:36.938644Z
2021-11-06T00:01:33.530210Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=40723', 'https://github.com/apache/qpid-proton/commit/b788baad3e9d9ba028d3d115e272e94a30227e17'}
{'https://github.com/apache/qpid-proton/commit/72c87537a136dbfc63a0c811d159631ecd0e3986'}
{'https://github.com/apache/qpid-proton/commit/b788baad3e9d9ba028d3d115e272e94a30227e17'}
{'https://github.com/apache/qpid-proton/commit/b788baad3e9d9ba028d3d115e272e94a30227e17'}
OSS-Fuzz
OSV-2021-1055
UNKNOWN WRITE in jxl::ModularFrameDecoder::DecodeGroup
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36456 ``` Crash type: UNKNOWN WRITE Crash state: jxl::ModularFrameDecoder::DecodeGroup jxl::FrameDecoder::ProcessACGroup jxl::ThreadPool::RunCallState<jxl::FrameDecoder::ProcessSections ```
null
2022-04-13T03:30:05.347108Z
2021-07-25T00:00:32.621715Z
HIGH
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36456', 'https://github.com/libvips/libvips/commit/86466a9b9ab37c0f469d84797d477260aa669cfa'}
{'https://github.com/libvips/libvips/commit/813a5f84cf94c9e7c0fe9b043c545500aef11411'}
{'https://github.com/libvips/libvips/commit/86466a9b9ab37c0f469d84797d477260aa669cfa'}
{'https://github.com/libvips/libvips/commit/86466a9b9ab37c0f469d84797d477260aa669cfa'}
OSS-Fuzz
OSV-2021-891
Heap-buffer-overflow in __cil_cat_expr_range_to_bitmap_helper
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35492 ``` Crash type: Heap-buffer-overflow READ 4 Crash state: __cil_cat_expr_range_to_bitmap_helper __cil_expr_to_bitmap __evaluate_cat_expression ```
null
2022-04-13T03:04:42.328918Z
2021-06-24T00:00:40.542962Z
MEDIUM
null
null
{'https://github.com/SELinuxProject/selinux/commit/8470058934e89d1876b8e034d1ea818bde62b994', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35492'}
{'https://github.com/SELinuxProject/selinux/commit/982ec302b67f3c7f8df667dadb67352b1e4a6d18'}
{'https://github.com/SELinuxProject/selinux/commit/8470058934e89d1876b8e034d1ea818bde62b994'}
{'https://github.com/SELinuxProject/selinux/commit/8470058934e89d1876b8e034d1ea818bde62b994'}
OSS-Fuzz
OSV-2020-468
Stack-buffer-overflow in ot::Ip6::Address::FromString
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14821 ``` Crash type: Stack-buffer-overflow WRITE 1 Crash state: ot::Ip6::Address::FromString ot::Cli::Coap::ProcessRequest ot::Cli::Interpreter::ProcessCoap ```
null
2022-04-13T03:04:38.893804Z
2020-07-01T00:00:11.286088Z
HIGH
null
null
{'https://github.com/openthread/openthread/commit/8bb50d4ccde667295f892f976ee5ff90ba4a4a2f', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14821'}
{'https://github.com/openthread/openthread/commit/1a4b249a9527c88ea2f573fea9fda39bb025b5b1'}
{'https://github.com/openthread/openthread/commit/8bb50d4ccde667295f892f976ee5ff90ba4a4a2f'}
{'https://github.com/openthread/openthread/commit/8bb50d4ccde667295f892f976ee5ff90ba4a4a2f'}
OSS-Fuzz
OSV-2020-487
UNKNOWN READ in crc32
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15278 ``` Crash type: UNKNOWN READ Crash state: crc32 update_crc push_data_ready ```
null
2022-04-13T03:04:41.162898Z
2020-07-01T00:00:12.477818Z
MEDIUM
null
null
{'https://github.com/libarchive/libarchive/commit/47bb8187d3ef2d49ee8c7841cb2872b3cfa1f6f7', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15278'}
{'https://github.com/libarchive/libarchive/commit/4bd12b6f40cb4413c8970c52f15f3b6885b5e32f'}
{'https://github.com/libarchive/libarchive/commit/47bb8187d3ef2d49ee8c7841cb2872b3cfa1f6f7'}
{'https://github.com/libarchive/libarchive/commit/47bb8187d3ef2d49ee8c7841cb2872b3cfa1f6f7'}
OSS-Fuzz
OSV-2021-487
UNKNOWN READ in blosc_run_decompression_with_context
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31611 ``` Crash type: UNKNOWN READ Crash state: blosc_run_decompression_with_context blosc2_decompress_ctx frame_decompress_chunk ```
null
2022-04-13T03:04:40.286519Z
2021-03-04T00:02:22.600849Z
MEDIUM
null
null
{'https://github.com/Blosc/c-blosc2/commit/cf02dfc992ae5544c92f69befc7093aacf168e77', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31611'}
{'https://github.com/Blosc/c-blosc2/commit/861ba79f31393dec0a0782ca11cf32cebb6f6610'}
{'https://github.com/Blosc/c-blosc2/commit/cf02dfc992ae5544c92f69befc7093aacf168e77'}
{'https://github.com/Blosc/c-blosc2/commit/cf02dfc992ae5544c92f69befc7093aacf168e77'}
PyPI
GHSA-mq5c-prh3-3f3h
Invalid validation in `QuantizeAndDequantizeV2`
### Impact The validation in `tf.raw_ops.QuantizeAndDequantizeV2` allows invalid values for `axis` argument: ```python import tensorflow as tf input_tensor = tf.constant([0.0], shape=[1], dtype=float) input_min = tf.constant(-10.0) input_max = tf.constant(-10.0) tf.raw_ops.QuantizeAndDequantizeV2( input=input_tensor, input_min=input_min, input_max=input_max, signed_input=False, num_bits=1, range_given=False, round_mode='HALF_TO_EVEN', narrow_range=False, axis=-2) ``` The [validation](https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L74-L77) uses `||` to mix two different conditions: ```cc OP_REQUIRES(ctx, (axis_ == -1 || axis_ < input.shape().dims()), errors::InvalidArgument(...)); ``` If `axis_ < -1` the condition in `OP_REQUIRES` will still be true, but this value of `axis_` results in heap underflow. This allows attackers to read/write to other data on the heap. ### Patches We have patched the issue in GitHub commit [c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9](https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29610'}
2022-03-03T05:14:14.075606Z
2021-05-21T14:28:32Z
LOW
null
{'CWE-665'}
{'https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29610', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mq5c-prh3-3f3h'}
null
{'https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9'}
{'https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9'}
PyPI
PYSEC-2021-171
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.SparseConcat`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/b432a38fe0e1b4b904a6c222cbce794c39703e87/tensorflow/core/kernels/sparse_concat_op.cc#L76) takes the values specified in `shapes[0]` as dimensions for the output shape. The `TensorShape` constructor(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L183-L188) uses a `CHECK` operation which triggers when `InitDims`(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L212-L296) returns a non-OK status. This is a legacy implementation of the constructor and operations should use `BuildTensorShapeBase` or `AddDimWithStatus` to prevent `CHECK`-failures in the presence of overflows. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'CVE-2021-29534', 'GHSA-6j9c-grc6-5m6g'}
2021-08-27T03:22:27.421981Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6j9c-grc6-5m6g'}
null
{'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c'}
{'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c'}
PyPI
PYSEC-2021-521
null
TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `BatchToSpaceNd` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/b5ed552fe55895aee8bd8b191f744a069957d18d/tensorflow/lite/kernels/batch_to_space_nd.cc#L81-L82). An attacker can craft a model such that one dimension of the `block` input is 0. Hence, the corresponding value in `block_shape` is 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-cfx7-2xpc-8w4h', 'CVE-2021-29593'}
2021-12-09T06:34:57.775345Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfx7-2xpc-8w4h', 'https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044'}
null
{'https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044'}
{'https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044'}
PyPI
PYSEC-2021-464
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow in `QuantizedReshape` by passing in invalid thresholds for the quantization. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/a324ac84e573fba362a5e53d4e74d5de6729933e/tensorflow/core/kernels/quantized_reshape_op.cc#L38-L55) assumes that the 2 arguments are always valid scalars and tries to access the numeric value directly. However, if any of these tensors is empty, then `.flat<T>()` is an empty buffer and accessing the element at position 0 results in overflow. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'CVE-2021-29536', 'GHSA-2gfx-95x2-5v3x'}
2021-12-09T06:34:48.953620Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2gfx-95x2-5v3x'}
null
{'https://github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e'}
{'https://github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e'}
PyPI
PYSEC-2022-57
null
Tensorflow is an Open Source Machine Learning Framework. The implementation of `StringNGrams` can be used to trigger a denial of service attack by causing an out of memory condition after an integer overflow. We are missing a validation on `pad_witdh` and that result in computing a negative value for `ngram_width` which is later used to allocate parts of the output. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
{'GHSA-98j8-c9q4-r38g', 'CVE-2022-21733'}
2022-03-09T00:17:30.939427Z
2022-02-03T12:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/string_ngrams_op.cc#L29-L161', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-98j8-c9q4-r38g'}
null
{'https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8'}
{'https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8'}
PyPI
PYSEC-2019-137
null
Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-Encoding should be a comma separated list, with the inner-most encoding first, followed by any further transfer codings, ending with chunked. Requests sent with: "Transfer-Encoding: gzip, chunked" would incorrectly get ignored, and the request would use a Content-Length header instead to determine the body size of the HTTP message. This could allow for Waitress to treat a single request as multiple requests in the case of HTTP pipelining. This issue is fixed in Waitress 1.4.0.
{'CVE-2019-16786', 'GHSA-g2xc-35jw-c63p'}
2020-02-25T17:15:00Z
2019-12-20T23:15:00Z
null
null
null
{'https://access.redhat.com/errata/RHSA-2020:0720', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5/', 'https://github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3', 'https://github.com/Pylons/waitress/security/advisories/GHSA-g2xc-35jw-c63p', 'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes'}
null
{'https://github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3'}
{'https://github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3'}
PyPI
GHSA-qg48-85hg-mqc5
Division by 0 in `DenseCountSparseOutput`
### Impact An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.DenseCountSparseOutput`: ```python import tensorflow as tf values = tf.constant([], shape=[0, 0], dtype=tf.int64) weights = tf.constant([]) tf.raw_ops.DenseCountSparseOutput( values=values, weights=weights, minlength=-1, maxlength=58, binary_output=True) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/efff014f3b2d8ef6141da30c806faf141297eca1/tensorflow/core/kernels/count_ops.cc#L123-L127) computes a divisor value from user data but does not check that the result is 0 before doing the division: ```cc int num_batch_elements = 1; for (int i = 0; i < num_batch_dimensions; ++i) { num_batch_elements *= data.shape().dim_size(i); } int num_value_elements = data.shape().num_elements() / num_batch_elements; ``` Since `data` is given by the `values` argument, `num_batch_elements` is 0. ### Patches We have patched the issue in GitHub commit [da5ff2daf618591f64b2b62d9d9803951b945e9f](https://github.com/tensorflow/tensorflow/commit/da5ff2daf618591f64b2b62d9d9803951b945e9f). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, and TensorFlow 2.3.3, as these are also affected. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29554'}
2022-03-03T05:14:16.368742Z
2021-05-21T14:23:55Z
LOW
null
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qg48-85hg-mqc5', 'https://github.com/tensorflow/tensorflow/commit/da5ff2daf618591f64b2b62d9d9803951b945e9f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29554'}
null
{'https://github.com/tensorflow/tensorflow/commit/da5ff2daf618591f64b2b62d9d9803951b945e9f'}
{'https://github.com/tensorflow/tensorflow/commit/da5ff2daf618591f64b2b62d9d9803951b945e9f'}
PyPI
PYSEC-2018-8
null
io/mongo/parser.py in Eve (aka pyeve) before 0.7.5 allows remote attackers to execute arbitrary code via Code Injection in the where parameter.
{'GHSA-8jxq-75rw-fhj9', 'CVE-2018-8097'}
2021-06-10T06:51:29.570871Z
2018-03-14T12:29:00Z
null
null
null
{'https://github.com/pyeve/eve/commit/f8f7019ffdf9b4e05faf95e1f04e204aa4c91f98', 'https://github.com/pyeve/eve/issues/1101', 'https://github.com/advisories/GHSA-8jxq-75rw-fhj9'}
null
{'https://github.com/pyeve/eve/commit/f8f7019ffdf9b4e05faf95e1f04e204aa4c91f98'}
{'https://github.com/pyeve/eve/commit/f8f7019ffdf9b4e05faf95e1f04e204aa4c91f98'}
PyPI
GHSA-3rcw-9p9x-582v
Code injection in `saved_model_cli`
### Impact TensorFlow's `saved_model_cli` tool is vulnerable to a code injection as it [calls `eval` on user supplied strings](https://github.com/tensorflow/tensorflow/blob/87462bfac761435a46641ff2f10ad0b6e5414a4b/tensorflow/python/tools/saved_model_cli.py#L524-L550) ```python def preprocess_input_exprs_arg_string(input_exprs_str): ... for input_raw in filter(bool, input_exprs_str.split(';')): ... input_key, expr = input_raw.split('=', 1) input_dict[input_key] = eval(expr) ... ``` This can be used by attackers to run arbitrary code on the plaform where the CLI tool runs. However, given that the tool is always run manually, the impact of this is not severe. We have patched this by adding a `safe` flag which defaults to `True` and an explicit warning for users. ### Patches We have patched the issue in GitHub commit [8b202f08d52e8206af2bdb2112a62fafbc546ec7](https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Omer Kaspi from Vdoo.
{'CVE-2021-41228'}
2022-03-03T05:13:08.134086Z
2021-11-10T16:54:02Z
HIGH
null
{'CWE-78', 'CWE-94'}
{'https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7', 'https://github.com/tensorflow/tensorflow', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41228', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3rcw-9p9x-582v'}
null
{'https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7'}
{'https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7'}
PyPI
PYSEC-2017-30
null
modules/chef.py in SaltStack before 2014.7.4 does not properly handle files in /tmp.
{'CVE-2015-1839'}
2021-07-05T00:01:26.213768Z
2017-04-13T14:59:00Z
null
null
null
{'https://docs.saltstack.com/en/latest/topics/releases/2014.7.4.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1212788', 'https://github.com/saltstack/salt/commit/b49d0d4b5ca5c6f31f03e2caf97cef1088eeed81', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175568.html', 'https://github.com/saltstack/salt/commit/22d2f7a1ec93300c34e8c42d14ec39d51e610b5c'}
null
{'https://github.com/saltstack/salt/commit/22d2f7a1ec93300c34e8c42d14ec39d51e610b5c', 'https://github.com/saltstack/salt/commit/b49d0d4b5ca5c6f31f03e2caf97cef1088eeed81'}
{'https://github.com/saltstack/salt/commit/b49d0d4b5ca5c6f31f03e2caf97cef1088eeed81', 'https://github.com/saltstack/salt/commit/22d2f7a1ec93300c34e8c42d14ec39d51e610b5c'}
PyPI
PYSEC-2020-258
null
In TensorFlow before 1.15.2 and 2.0.1, converting a string (from Python) to a tf.float16 value results in a segmentation fault in eager mode as the format checks for this use case are only in the graph mode. This issue can lead to denial of service in inference/training where a malicious attacker can send a data point which contains a string instead of a tf.float16 value. Similar effects can be obtained by manipulating saved models and checkpoints whereby replacing a scalar tf.float16 value with a scalar string will trigger this issue due to automatic conversions. This can be easily reproduced by tf.constant("hello", tf.float16), if eager execution is enabled. This issue is patched in TensorFlow 1.15.1 and 2.0.1 with this vulnerability patched. TensorFlow 2.1.0 was released after we fixed the issue, thus it is not affected. Users are encouraged to switch to TensorFlow 1.15.1, 2.0.1 or 2.1.0.
{'GHSA-977j-xj7q-2jr9', 'CVE-2020-5215'}
2021-08-27T03:22:23.423115Z
2020-01-28T22:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-977j-xj7q-2jr9', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.0.1', 'https://github.com/tensorflow/tensorflow/commit/5ac1b9e24ff6afc465756edf845d2e9660bd34bf', 'https://github.com/tensorflow/tensorflow/releases/tag/v1.15.2'}
null
{'https://github.com/tensorflow/tensorflow/commit/5ac1b9e24ff6afc465756edf845d2e9660bd34bf'}
{'https://github.com/tensorflow/tensorflow/commit/5ac1b9e24ff6afc465756edf845d2e9660bd34bf'}
PyPI
PYSEC-2021-608
null
TensorFlow is an open source platform for machine learning. In affected versions if `tf.tile` is called with a large input argument then the TensorFlow process will crash due to a `CHECK`-failure caused by an overflow. The number of elements in the output tensor is too much for the `int64_t` type and the overflow is detected via a `CHECK` statement. This aborts the process. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'GHSA-2p25-55c9-h58q', 'CVE-2021-41198'}
2021-12-09T06:35:07.301547Z
2021-11-05T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f', 'https://github.com/tensorflow/tensorflow/issues/46911', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2p25-55c9-h58q'}
null
{'https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f'}
{'https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f'}
PyPI
PYSEC-2021-47
null
Pydantic is a data validation and settings management using Python type hinting. In affected versions passing either `'infinity'`, `'inf'` or `float('inf')` (or their negatives) to `datetime` or `date` fields causes validation to run forever with 100% CPU usage (on one CPU). Pydantic has been patched with fixes available in the following versions: v1.8.2, v1.7.4, v1.6.2. All these versions are available on pypi(https://pypi.org/project/pydantic/#history), and will be available on conda-forge(https://anaconda.org/conda-forge/pydantic) soon. See the changelog(https://pydantic-docs.helpmanual.io/) for details. If you absolutely can't upgrade, you can work around this risk using a validator(https://pydantic-docs.helpmanual.io/usage/validators/) to catch these values. This is not an ideal solution (in particular you'll need a slightly different function for datetimes), instead of a hack like this you should upgrade pydantic. If you are not using v1.8.x, v1.7.x or v1.6.x and are unable to upgrade to a fixed version of pydantic, please create an issue at https://github.com/samuelcolvin/pydantic/issues requesting a back-port, and we will endeavour to release a patch for earlier versions of pydantic.
{'GHSA-5jqp-qgf6-3pvh', 'CVE-2021-29510'}
2021-05-13T19:15:00Z
2021-05-13T19:15:00Z
null
null
null
{'https://github.com/samuelcolvin/pydantic/security/advisories/GHSA-5jqp-qgf6-3pvh', 'https://github.com/samuelcolvin/pydantic/commit/7e83fdd2563ffac081db7ecdf1affa65ef38c468'}
null
{'https://github.com/samuelcolvin/pydantic/commit/7e83fdd2563ffac081db7ecdf1affa65ef38c468'}
{'https://github.com/samuelcolvin/pydantic/commit/7e83fdd2563ffac081db7ecdf1affa65ef38c468'}
PyPI
PYSEC-2021-258
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of `tf.raw_ops.SparseDenseCwiseDiv` is vulnerable to a division by 0 error. The [implementation](https://github.com/tensorflow/tensorflow/blob/a1bc56203f21a5a4995311825ffaba7a670d7747/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc#L56) uses a common class for all binary operations but fails to treat the division by 0 case separately. We have patched the issue in GitHub commit d9204be9f49520cdaaeb2541d1dc5187b23f31d9. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'CVE-2021-37636', 'GHSA-hp4c-x6r7-6555'}
2021-08-27T03:22:42.737707Z
2021-08-12T18:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hp4c-x6r7-6555'}
null
{'https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9'}
{'https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9'}
PyPI
PYSEC-2021-576
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions due to incomplete validation in `tf.raw_ops.QuantizeV2`, an attacker can trigger undefined behavior via binding a reference to a null pointer or can access data outside the bounds of heap allocated arrays. The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/quantize_op.cc#L59) has some validation but does not check that `min_range` and `max_range` both have the same non-zero number of elements. If `axis` is provided (i.e., not `-1`), then validation should check that it is a value in range for the rank of `input` tensor and then the lengths of `min_range` and `max_range` inputs match the `axis` dimension of the `input` tensor. We have patched the issue in GitHub commit 6da6620efad397c85493b8f8667b821403516708. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'GHSA-g25h-jr74-qp5j', 'CVE-2021-37663'}
2021-12-09T06:35:04.358938Z
2021-08-12T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g25h-jr74-qp5j'}
null
{'https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708'}
{'https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708'}
PyPI
PYSEC-2020-126
null
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, by controlling the `fill` argument of tf.strings.as_string, a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a `printf` call is constructed. This may result in segmentation fault. The issue is patched in commit 33be22c65d86256e6826666662e40dbdfe70ee83, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
{'GHSA-xmq7-7fxm-rr79', 'CVE-2020-15203'}
2020-10-29T16:15:00Z
2020-09-25T19:15:00Z
null
null
null
{'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xmq7-7fxm-rr79', 'https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}
null
{'https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83'}
{'https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83'}
PyPI
GHSA-xm2v-8rrw-w9pm
Division by 0 in `Conv2DBackpropInput`
### Impact An attacker can trigger a division by 0 in `tf.raw_ops.Conv2DBackpropInput`: ```python import tensorflow as tf input_tensor = tf.constant([52, 1, 1, 5], shape=[4], dtype=tf.int32) filter_tensor = tf.constant([], shape=[0, 1, 5, 0], dtype=tf.float32) out_backprop = tf.constant([], shape=[52, 1, 1, 0], dtype=tf.float32) tf.raw_ops.Conv2DBackpropInput(input_sizes=input_tensor, filter=filter_tensor, out_backprop=out_backprop, strides=[1, 1, 1, 1], use_cudnn_on_gpu=True, padding='SAME', explicit_paddings=[], data_format='NHWC', dilations=[1, 1, 1, 1]) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/b40060c9f697b044e3107917c797ba052f4506ab/tensorflow/core/kernels/conv_grad_input_ops.h#L625-L655) does a division by a quantity that is controlled by the caller: ```cc const size_t size_A = output_image_size * dims.out_depth; const size_t size_B = filter_total_size * dims.out_depth; const size_t size_C = output_image_size * filter_total_size; const size_t work_unit_size = size_A + size_B + size_C; ... const size_t shard_size = use_parallel_contraction ? 1 : (target_working_set_size + work_unit_size - 1) / work_unit_size; ``` ### Patches We have patched the issue in GitHub commit [2be2cdf3a123e231b16f766aa0e27d56b4606535](https://github.com/tensorflow/tensorflow/commit/2be2cdf3a123e231b16f766aa0e27d56b4606535). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29525'}
2022-03-03T05:14:18.787736Z
2021-05-21T14:21:51Z
LOW
null
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xm2v-8rrw-w9pm', 'https://github.com/tensorflow/tensorflow/commit/2be2cdf3a123e231b16f766aa0e27d56b4606535', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29525'}
null
{'https://github.com/tensorflow/tensorflow/commit/2be2cdf3a123e231b16f766aa0e27d56b4606535'}
{'https://github.com/tensorflow/tensorflow/commit/2be2cdf3a123e231b16f766aa0e27d56b4606535'}
PyPI
PYSEC-2021-825
null
TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for `AllToAll` can be made to execute a division by 0. This occurs whenever the `split_count` argument is 0. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'CVE-2021-41218', 'GHSA-9crf-c6qr-r273'}
2021-12-09T06:35:43.909633Z
2021-11-05T22:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9crf-c6qr-r273', 'https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc'}
null
{'https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc'}
{'https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc'}
PyPI
GHSA-x5cp-9pcf-pp3h
Denial of Service in Tensorflow
### Impact The `RaggedCountSparseOutput` does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the `splits` tensor has the minimum required number of elements. Code uses this quantity to initialize a different data structure: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L241-L244 Since `BatchedMap` is equivalent to a vector, it needs to have at least one element to not be `nullptr`. If user passes a `splits` tensor that is empty or has exactly one element, we get a `SIGABRT` signal raised by the operating system. ### Patches We have patched the issue in 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and will release a patch release. We recommend users to upgrade to TensorFlow 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability is a variant of [GHSA-p5f8-gfw5-33w4](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4)
{'CVE-2020-15199'}
2021-08-26T15:11:57Z
2020-09-25T18:28:24Z
MODERATE
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15199', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x5cp-9pcf-pp3h', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}
null
{'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'}
{'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'}
PyPI
GHSA-h98h-8mxr-m8gx
Out-of-bounds read in TensorFlow possibly causing disclosure of the contents of process memory.
TensorFlow before 1.7.0 has an integer overflow that causes an out-of-bounds read, possibly causing disclosure of the contents of process memory. This occurs in the DecodeBmp feature of the BMP decoder in core/kernels/decode_bmp_op.cc.
{'CVE-2018-21233'}
2022-03-03T05:13:28.032180Z
2020-05-13T16:01:35Z
MODERATE
null
{'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-21233', 'https://github.com/tensorflow/tensorflow/commit/49f73c55d56edffebde4bca4a407ad69c1cae433', 'https://github.com/tensorflow/tensorflow/', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-001.md'}
null
{'https://github.com/tensorflow/tensorflow/commit/49f73c55d56edffebde4bca4a407ad69c1cae433'}
{'https://github.com/tensorflow/tensorflow/commit/49f73c55d56edffebde4bca4a407ad69c1cae433'}
PyPI
GHSA-545v-42p7-98fq
Heap out of bounds read in `MaxPoolGradWithArgmax`
### Impact The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs: ```python import tensorflow as tf input = tf.constant([10.0, 10.0, 10.0], shape=[1, 1, 3, 1], dtype=tf.float32) grad = tf.constant([10.0, 10.0, 10.0, 10.0], shape=[1, 1, 1, 4], dtype=tf.float32) argmax = tf.constant([1], shape=[1], dtype=tf.int64) ksize = [1, 1, 1, 1] strides = [1, 1, 1, 1] tf.raw_ops.MaxPoolGradWithArgmax( input=input, grad=grad, argmax=argmax, ksize=ksize, strides=strides, padding='SAME', include_batch_in_index=False) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/ef0c008ee84bad91ec6725ddc42091e19a30cf0e/tensorflow/core/kernels/maxpooling_op.cc#L1016-L1017) uses the same value to index in two different arrays but there is no guarantee that the sizes are identical. ### Patches We have patched the issue in GitHub commit [dcd7867de0fea4b72a2b34bd41eb74548dc23886](https://github.com/tensorflow/tensorflow/commit/dcd7867de0fea4b72a2b34bd41eb74548dc23886). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29570'}
2022-03-03T05:13:39.721123Z
2021-05-21T14:25:25Z
LOW
null
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-545v-42p7-98fq', 'https://github.com/tensorflow/tensorflow/commit/dcd7867de0fea4b72a2b34bd41eb74548dc23886', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29570'}
null
{'https://github.com/tensorflow/tensorflow/commit/dcd7867de0fea4b72a2b34bd41eb74548dc23886'}
{'https://github.com/tensorflow/tensorflow/commit/dcd7867de0fea4b72a2b34bd41eb74548dc23886'}
PyPI
PYSEC-2014-98
null
Cross-site scripting (XSS) vulnerability in plugins/main/content/js/ajenti.coffee in Eugene Pankov Ajenti 1.2.13 allows remote authenticated users to inject arbitrary web script or HTML via the command field in the Cron functionality.
{'CVE-2014-2260'}
2021-12-13T06:35:03.047936Z
2014-04-30T23:58:00Z
null
null
null
{'https://github.com/Eugeny/ajenti/commit/3270fd1d78391bb847b4c9ce37cf921f485b1310', 'https://github.com/Eugeny/ajenti/issues/233', 'http://www.securityfocus.com/bid/64982', 'http://packetstormsecurity.com/files/124804/Ajenti-1.2.13-Cross-Site-Scripting.html', 'http://www.osvdb.org/102174'}
null
{'https://github.com/Eugeny/ajenti/commit/3270fd1d78391bb847b4c9ce37cf921f485b1310'}
{'https://github.com/Eugeny/ajenti/commit/3270fd1d78391bb847b4c9ce37cf921f485b1310'}
PyPI
PYSEC-2021-599
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the strided slice implementation in TFLite has a logic bug which can allow an attacker to trigger an infinite loop. This arises from newly introduced support for [ellipsis in axis definition](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/strided_slice.cc#L103-L122). An attacker can craft a model such that `ellipsis_end_idx` is smaller than `i` (e.g., always negative). In this case, the inner loop does not increase `i` and the `continue` statement causes execution to skip over the preincrement at the end of the outer loop. We have patched the issue in GitHub commit dfa22b348b70bb89d6d6ec0ff53973bacb4f4695. TensorFlow 2.6.0 is the only affected version.
{'CVE-2021-37686', 'GHSA-mhhc-q96p-mfm9'}
2021-12-09T06:35:06.351462Z
2021-08-12T22:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mhhc-q96p-mfm9', 'https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695'}
null
{'https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695'}
{'https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695'}
PyPI
PYSEC-2017-67
null
PySAML2 allows remote attackers to conduct XML external entity (XXE) attacks via a crafted SAML XML request or response.
{'CVE-2016-10127'}
2021-07-25T23:34:51.281897Z
2017-03-03T15:59:00Z
null
null
null
{'http://www.securityfocus.com/bid/95376', 'https://github.com/rohe/pysaml2/pull/379', 'https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc9b', 'http://www.openwall.com/lists/oss-security/2017/01/19/5', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850716', 'https://github.com/rohe/pysaml2/issues/366'}
null
{'https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc9b'}
{'https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc9b'}
PyPI
GHSA-4hrh-9vmp-2jgg
Heap buffer overflow in `StringNGrams`
### Impact An attacker can cause a heap buffer overflow by passing crafted inputs to `tf.raw_ops.StringNGrams`: ```python import tensorflow as tf separator = b'\x02\x00' ngram_widths = [7, 6, 11] left_pad = b'\x7f\x7f\x7f\x7f\x7f' right_pad = b'\x7f\x7f\x25\x5d\x53\x74' pad_width = 50 preserve_short_sequences = True l = ['', '', '', '', '', '', '', '', '', '', ''] data = tf.constant(l, shape=[11], dtype=tf.string) l2 = [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 3] data_splits = tf.constant(l2, shape=[116], dtype=tf.int64) out = tf.raw_ops.StringNGrams(data=data, data_splits=data_splits, separator=separator, ngram_widths=ngram_widths, left_pad=left_pad, right_pad=right_pad, pad_width=pad_width, preserve_short_sequences=preserve_short_sequences) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/1cdd4da14282210cc759e468d9781741ac7d01bf/tensorflow/core/kernels/string_ngrams_op.cc#L171-L185) fails to consider corner cases where input would be split in such a way that the generated tokens should only contain padding elements: ```cc for (int ngram_index = 0; ngram_index < num_ngrams; ++ngram_index) { int pad_width = get_pad_width(ngram_width); int left_padding = std::max(0, pad_width - ngram_index); int right_padding = std::max(0, pad_width - (num_ngrams - (ngram_index + 1))); int num_tokens = ngram_width - (left_padding + right_padding); int data_start_index = left_padding > 0 ? 0 : ngram_index - pad_width; ... tstring* ngram = &output[ngram_index]; ngram->reserve(ngram_size); for (int n = 0; n < left_padding; ++n) { ngram->append(left_pad_); ngram->append(separator_); } for (int n = 0; n < num_tokens - 1; ++n) { ngram->append(data[data_start_index + n]); ngram->append(separator_); } ngram->append(data[data_start_index + num_tokens - 1]); // <<< for (int n = 0; n < right_padding; ++n) { ngram->append(separator_); ngram->append(right_pad_); } ... } ``` If input is such that `num_tokens` is 0, then, for `data_start_index=0` (when left padding is present), the marked line would result in reading `data[-1]`. ### Patches We have patched the issue in GitHub commit [ba424dd8f16f7110eea526a8086f1a155f14f22b](https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29542'}
2022-04-26T18:17:07.368107Z
2021-05-21T14:23:15Z
LOW
null
{'CWE-787', 'CWE-131'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29542', 'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hrh-9vmp-2jgg'}
null
{'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b'}
{'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b'}
PyPI
GHSA-452g-f7fp-9jf7
Type confusion during tensor casts lead to dereferencing null pointers
### Impact Calling TF operations with tensors of non-numeric types when the operations expect numeric tensors result in null pointer dereferences. There are multiple ways to reproduce this, listing a few examples here: ```python import tensorflow as tf import numpy as np data = tf.random.truncated_normal(shape=1,mean=np.float32(20.8739),stddev=779.973,dtype=20,seed=64) ``` ```python import tensorflow as tf import numpy as np data = tf.random.stateless_truncated_normal(shape=1,seed=[63,70],mean=np.float32(20.8739),stddev=779.973,dtype=20) ``` ```python import tensorflow as tf import numpy as np data = tf.one_hot(indices=[62,50],depth=136,on_value=np.int32(237),off_value=158,axis=856,dtype=20) ``` ```python import tensorflow as tf import numpy as np data = tf.range(start=np.int32(214),limit=660,delta=129,dtype=20) ``` ```python import tensorflow as tf import numpy as np data = tf.raw_ops.ResourceCountUpTo(resource=np.int32(30), limit=872, T=3) ``` ```python import tensorflow as tf import numpy as np writer_array = np.array([1,2],dtype=np.int32) writer_tensor = tf.convert_to_tensor(writer_array,dtype=tf.resource) ``` All these examples and similar ones have the same behavior: the [conversion from Python array to C++ array](https://github.com/tensorflow/tensorflow/blob/ff70c47a396ef1e3cb73c90513da4f5cb71bebba/tensorflow/python/lib/core/ndarray_tensor.cc#L113-L169) is vulnerable to a type confusion: ```cc int pyarray_type = PyArray_TYPE(array); PyArray_Descr* descr = PyArray_DESCR(array); switch (pyarray_type) { ... case NPY_VOID: // Quantized types are currently represented as custom struct types. // PyArray_TYPE returns NPY_VOID for structs, and we should look into // descr to derive the actual type. // Direct feeds of certain types of ResourceHandles are represented as a // custom struct type. return PyArrayDescr_to_TF_DataType(descr, out_tf_datatype); ... } ``` For the tensor types involved in the above example, the `pyarray_type` is `NPY_VOID` but the `descr` field is such that `descr->field = NULL`. Then [`PyArrayDescr_to_TF_DataType`](https://github.com/tensorflow/tensorflow/blob/ff70c47a396ef1e3cb73c90513da4f5cb71bebba/tensorflow/python/lib/core/ndarray_tensor.cc#L72-L77) will trigger a null dereference: ```cc Status PyArrayDescr_to_TF_DataType(PyArray_Descr* descr, TF_DataType* out_tf_datatype) { PyObject* key; PyObject* value; Py_ssize_t pos = 0; if (PyDict_Next(descr->fields, &pos, &key, &value)) { ... } } ``` This is because the Python's `PyDict_Next` implementation would dereference the first argument. ### Patches We have patched the issue in GitHub commit [030af767d357d1b4088c4a25c72cb3906abac489](https://github.com/tensorflow/tensorflow/commit/030af767d357d1b4088c4a25c72cb3906abac489). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360 as well as Ye Zhang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29513'}
2022-03-03T05:12:35.841801Z
2021-05-21T14:20:46Z
LOW
null
{'CWE-476'}
{'https://github.com/tensorflow/tensorflow/commit/030af767d357d1b4088c4a25c72cb3906abac489', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-452g-f7fp-9jf7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29513'}
null
{'https://github.com/tensorflow/tensorflow/commit/030af767d357d1b4088c4a25c72cb3906abac489'}
{'https://github.com/tensorflow/tensorflow/commit/030af767d357d1b4088c4a25c72cb3906abac489'}
PyPI
GHSA-h9px-9vqg-222h
Heap OOB in `QuantizeAndDequantizeV3`
### Impact An attacker can read data outside of bounds of heap allocated buffer in `tf.raw_ops.QuantizeAndDequantizeV3`: ```python import tensorflow as tf tf.raw_ops.QuantizeAndDequantizeV3( input=[2.5,2.5], input_min=[0,0], input_max=[1,1], num_bits=[30], signed_input=False, range_given=False, narrow_range=False, axis=3) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/11ff7f80667e6490d7b5174aa6bf5e01886e770f/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L237) does not validate the value of user supplied `axis` attribute before using it to index in the array backing the `input` argument: ```cc const int depth = (axis_ == -1) ? 1 : input.dim_size(axis_); ``` ### Patches We have patched the issue in GitHub commit [99085e8ff02c3763a0ec2263e44daec416f6a387](https://github.com/tensorflow/tensorflow/commit/99085e8ff02c3763a0ec2263e44daec416f6a387). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Aivul Team from Qihoo 360.
{'CVE-2021-29553'}
2022-03-03T05:13:50.806338Z
2021-05-21T14:23:51Z
LOW
null
{'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29553', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h9px-9vqg-222h', 'https://github.com/tensorflow/tensorflow/commit/99085e8ff02c3763a0ec2263e44daec416f6a387'}
null
{'https://github.com/tensorflow/tensorflow/commit/99085e8ff02c3763a0ec2263e44daec416f6a387'}
{'https://github.com/tensorflow/tensorflow/commit/99085e8ff02c3763a0ec2263e44daec416f6a387'}
PyPI
PYSEC-2021-833
null
TensorFlow is an open source platform for machine learning. In affected versions the implementation of `SparseBinCount` is vulnerable to a heap OOB access. This is because of missing validation between the elements of the `values` argument and the shape of the sparse output. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{'CVE-2021-41226', 'GHSA-374m-jm66-3vj8'}
2021-12-09T06:35:45.112404Z
2021-11-05T21:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-374m-jm66-3vj8'}
null
{'https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba'}
{'https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba'}
PyPI
PYSEC-2020-130
null
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, to mimic Python's indexing with negative values, TFLite uses `ResolveAxis` to convert negative values to positive indices. However, the only check that the converted index is now valid is only present in debug builds. If the `DCHECK` does not trigger, then code execution moves ahead with a negative index. This, in turn, results in accessing data out of bounds which results in segfaults and/or data corruption. The issue is patched in commit 2d88f470dea2671b430884260f3626b1fe99830a, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
{'CVE-2020-15207', 'GHSA-q4qf-3fc6-8x34'}
2020-10-29T16:15:00Z
2020-09-25T19:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q4qf-3fc6-8x34', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}
null
{'https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a'}
{'https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a'}
PyPI
PYSEC-2021-130
null
JupyterLab is a user interface for Project Jupyter which will eventually replace the classic Jupyter Notebook. In affected versions untrusted notebook can execute code on load. In particular JupyterLab doesn’t sanitize the action attribute of html `<form>`. Using this it is possible to trigger the form validation outside of the form itself. This is a remote code execution, but requires user action to open a notebook.
{'CVE-2021-32797', 'GHSA-4952-p58q-6crx'}
2021-08-27T03:22:05.377903Z
2021-08-09T21:15:00Z
null
null
null
{'https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-6crx', 'https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed'}
null
{'https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed'}
{'https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed'}
PyPI
GHSA-vw27-fwjf-5qxm
Arbitrary command execution on Windows via qutebrowserurl: URL handler
### Impact Starting with qutebrowser v1.7.0, the Windows installer for qutebrowser registers it as a handler for certain URL schemes. With some applications such as Outlook Desktop, opening a specially crafted URL can lead to argument injection, allowing execution of qutebrowser commands, which in turn allows arbitrary code execution via commands such as `:spawn` or `:debug-pyeval`. Only Windows installs where qutebrowser is registered as URL handler are affected. It does *not* have to be set as default browser for the exploit to work. ### Patches The issue has been fixed in [qutebrowser v2.4.0](https://github.com/qutebrowser/qutebrowser/releases/tag/v2.4.0) in commit 8f46ba3f6dc7b18375f7aa63c48a1fe461190430. The fix also adds additional hardening for potential similar issues on Linux (by adding the new `--untrusted-args` flag to the `.desktop` file), though no such vulnerabilities are known. Backported patches for older versions are available, but no further releases are planned: - v1.7.x: d1ceaab - v1.8.x: ca7155d - v1.9.x: 157d871 - v1.10.x: 94a6125 - v1.11.x: 10acfbb - v1.12.x: 363a18f - v1.13.x: 410f262 - v1.14.x: e4f4d93 - v2.0.x: 15a1654 - v2.1.x: 509ddf2 - v2.2.x: 03dcba5 - v2.3.x: 00a694c (commits are referring to qutebrowser/qutebrowser on GitHub) ### Workarounds Remove qutebrowser from the default browser settings entirely, so that it does not handle any kind of URLs. Make sure to remove *all* handlers, including an (accidental) `qutebrowserURL` handler, e.g. using [NirSoft URLProtocolView](https://www.nirsoft.net/utils/url_protocol_view.html). ### Timeline 2021-10-15: Issue reported via security@qutebrowser.org by Ping Fan (Zetta) Ke of [Valkyrie-X Security Research Group (VXRL)](https://www.vxrl.hk/) 2021-10-15: Issue confirmed by @The-Compiler (lead developer), author of installer (@bitraid) contacted for help/review 2021-10-15: CVE assigned by GitHub 2021-10-15 to 2021-10-17: Fix developed 2021-10-17: Additional core developer (@toofar) contacted for help/review 2021-10-21: v2.4.0 released containing the fix 2021-10-21: Advisory and fix published ### References See the [commit message](https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430) for additional information and references to various similar issues in other projects. ### Acknowledgements Thanks to Ping Fan (Zetta) Ke of [Valkyrie-X Security Research Group](https://www.vxrl.hk/) (VXRL/@vxresearch) for finding and responsibly disclosing this issue. ### Contact If you have any questions or comments about this advisory, please email [security@qutebrowser.org](mailto:security@qutebrowser.org).
{'CVE-2021-41146'}
2022-03-03T05:13:43.293872Z
2021-10-22T16:20:10Z
HIGH
null
{'CWE-77', 'CWE-641', 'CWE-88'}
{'https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41146', 'https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-vw27-fwjf-5qxm', 'https://github.com/qutebrowser/qutebrowser'}
null
{'https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430'}
{'https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430'}
PyPI
GHSA-c968-pq7h-7fxv
Division by 0 in `Conv3DBackprop*`
### Impact The `tf.raw_ops.Conv3DBackprop*` operations fail to validate that the input tensors are not empty. In turn, this would result in a division by 0: ```python import tensorflow as tf input_sizes = tf.constant([0, 0, 0, 0, 0], shape=[5], dtype=tf.int32) filter_tensor = tf.constant([], shape=[0, 0, 0, 1, 0], dtype=tf.float32) out_backprop = tf.constant([], shape=[0, 0, 0, 0, 0], dtype=tf.float32) tf.raw_ops.Conv3DBackpropInputV2(input_sizes=input_sizes, filter=filter_tensor, out_backprop=out_backprop, strides=[1, 1, 1, 1, 1], padding='SAME', data_format='NDHWC', dilations=[1, 1, 1, 1, 1]) ``` ```python import tensorflow as tf input_sizes = tf.constant([1], shape=[1, 1, 1, 1, 1], dtype=tf.float32) filter_tensor = tf.constant([0, 0, 0, 1, 0], shape=[5], dtype=tf.int32) out_backprop = tf.constant([], shape=[1, 1, 1, 1, 0], dtype=tf.float32) tf.raw_ops.Conv3DBackpropFilterV2(input=input_sizes, filter_sizes=filter_tensor, out_backprop=out_backprop, strides=[1, 1, 1, 1, 1], padding='SAME', data_format='NDHWC', dilations=[1, 1, 1, 1, 1]) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/a91bb59769f19146d5a0c20060244378e878f140/tensorflow/core/kernels/conv_grad_ops_3d.cc#L430-L450) does not check that the divisor used in computing the shard size is not zero: ```cc const int64 size_A = output_image_size * dims.out_depth; const int64 size_B = filter_total_size * dims.out_depth; const int64 size_C = output_image_size * filter_total_size; const int64 work_unit_size = size_A + size_B + size_C; ... const size_t shard_size = use_parallel_contraction ? 1 : (target_working_set_size + work_unit_size - 1) / work_unit_size; ``` Thus, if attacker controls the input sizes, they can trigger a denial of service via a division by zero error. ### Patches We have patched the issue in GitHub commit [311403edbc9816df80274bd1ea8b3c0c0f22c3fa](https://github.com/tensorflow/tensorflow/commit/311403edbc9816df80274bd1ea8b3c0c0f22c3fa). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29522'}
2022-03-03T05:13:17.830516Z
2021-05-21T14:21:39Z
LOW
null
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/commit/311403edbc9816df80274bd1ea8b3c0c0f22c3fa', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29522', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c968-pq7h-7fxv'}
null
{'https://github.com/tensorflow/tensorflow/commit/311403edbc9816df80274bd1ea8b3c0c0f22c3fa'}
{'https://github.com/tensorflow/tensorflow/commit/311403edbc9816df80274bd1ea8b3c0c0f22c3fa'}
PyPI
PYSEC-2021-560
null
TensorFlow is an end-to-end open source platform for machine learning. When a user does not supply arguments that determine a valid sparse tensor, `tf.raw_ops.SparseTensorSliceDataset` implementation can be made to dereference a null pointer. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/data/sparse_tensor_slice_dataset_op.cc#L240-L251) has some argument validation but fails to consider the case when either `indices` or `values` are provided for an empty sparse tensor when the other is not. If `indices` is empty, then [code that performs validation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/data/sparse_tensor_slice_dataset_op.cc#L260-L261) (i.e., checking that the indices are monotonically increasing) results in a null pointer dereference. If `indices` as provided by the user is empty, then `indices` in the C++ code above is backed by an empty `std::vector`, hence calling `indices->dim_size(0)` results in null pointer dereferencing (same as calling `std::vector::at()` on an empty vector). We have patched the issue in GitHub commit 02cc160e29d20631de3859c6653184e3f876b9d7. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
{'GHSA-c5x2-p679-95wc', 'CVE-2021-37647'}
2021-12-09T06:35:03.005830Z
2021-08-12T19:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c5x2-p679-95wc', 'https://github.com/tensorflow/tensorflow/commit/02cc160e29d20631de3859c6653184e3f876b9d7'}
null
{'https://github.com/tensorflow/tensorflow/commit/02cc160e29d20631de3859c6653184e3f876b9d7'}
{'https://github.com/tensorflow/tensorflow/commit/02cc160e29d20631de3859c6653184e3f876b9d7'}
PyPI
PYSEC-2022-139
null
Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCostEstimator::CalculateTensorSize` is vulnerable to an integer overflow if an attacker can create an operation which would involve a tensor with large enough number of elements. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
{'CVE-2022-23575', 'GHSA-c94w-c95p-phf8'}
2022-03-09T00:18:27.680857Z
2022-02-04T23:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/fcd18ce3101f245b083b30655c27b239dc72221e', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c94w-c95p-phf8', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1552-L1558'}
null
{'https://github.com/tensorflow/tensorflow/commit/fcd18ce3101f245b083b30655c27b239dc72221e'}
{'https://github.com/tensorflow/tensorflow/commit/fcd18ce3101f245b083b30655c27b239dc72221e'}
PyPI
PYSEC-2021-425
null
Matrix is an ecosystem for open federated Instant Messaging and Voice over IP. In versions 1.41.0 and prior, unauthorised users can access the membership (list of members, with their display names) of a room if they know the ID of the room. The vulnerability is limited to rooms with `shared` history visibility. Furthermore, the unauthorised user must be using an account on a vulnerable homeserver that is in the room. Server administrators should upgrade to 1.41.1 or later in order to receive the patch. One workaround is available. Administrators of servers that use a reverse proxy could, with potentially unacceptable loss of functionality, block the endpoints: `/_matrix/client/r0/rooms/{room_id}/members` with `at` query parameter, and `/_matrix/client/unstable/rooms/{room_id}/members` with `at` query parameter.
{'CVE-2021-39164', 'GHSA-3x4c-pq33-4w3q'}
2021-11-16T03:58:44.571857Z
2021-08-31T17:15:00Z
null
null
null
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXT7ID7DNBRN2TVTETU3SYQHJKEG6PXN/', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-3x4c-pq33-4w3q', 'https://github.com/matrix-org/synapse/releases/tag/v1.41.1', 'https://github.com/matrix-org/synapse/commit/cb35df940a', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2VHDEPCZ22GJFMZCWA2XZAGPOEV72POF/'}
null
{'https://github.com/matrix-org/synapse/commit/cb35df940a'}
{'https://github.com/matrix-org/synapse/commit/cb35df940a'}
PyPI
PYSEC-2022-16
null
Jupyter Server Proxy is a Jupyter notebook server extension to proxy web services. Versions of Jupyter Server Proxy prior to 3.2.1 are vulnerable to Server-Side Request Forgery (SSRF). Any user deploying Jupyter Server or Notebook with jupyter-proxy-server extension enabled is affected. A lack of input validation allows authenticated clients to proxy requests to other hosts, bypassing the `allowed_hosts` check. Because authentication is required, which already grants permissions to make the same requests via kernel or terminal execution, this is considered low to moderate severity. Users may upgrade to version 3.2.1 to receive a patch or, as a workaround, install the patch manually.
{'CVE-2022-21697', 'GHSA-gcv9-6737-pjqw'}
2022-02-01T17:37:55.179786Z
2022-01-25T14:15:00Z
null
null
null
{'https://github.com/jupyterhub/jupyter-server-proxy/security/advisories/GHSA-gcv9-6737-pjqw', 'https://github.com/jupyterhub/jupyter-server-proxy/commit/fd31930bacd12188c448c886e0783529436b99eb', 'https://github.com/jupyterhub/jupyter-server-proxy/compare/v3.2.0...v3.2.1.patch'}
null
{'https://github.com/jupyterhub/jupyter-server-proxy/commit/fd31930bacd12188c448c886e0783529436b99eb'}
{'https://github.com/jupyterhub/jupyter-server-proxy/commit/fd31930bacd12188c448c886e0783529436b99eb'}
PyPI
GHSA-xqfj-cr6q-pc8w
Crash in `tf.transpose` with complex inputs
### Impact Passing a complex argument to `tf.transpose` at the same time as passing `conjugate=True` argument results in a crash: ```python import tensorflow as tf tf.transpose(conjugate=True, a=complex(1)) ``` ### Patches We have received a patch for the issue in GitHub commit [1dc6a7ce6e0b3e27a7ae650bfc05b195ca793f88](https://github.com/tensorflow/tensorflow/commit/1dc6a7ce6e0b3e27a7ae650bfc05b195ca793f88). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported in [#42105](https://github.com/tensorflow/issues/42105) and fixed in [#46973](https://github.com/tensorflow/issues/46973).
{'CVE-2021-29618'}
2022-03-03T05:12:38.691679Z
2021-05-21T14:28:58Z
LOW
null
{'CWE-755'}
{'https://github.com/tensorflow/issues/46973', 'https://github.com/tensorflow/tensorflow/commit/1dc6a7ce6e0b3e27a7ae650bfc05b195ca793f88', 'https://github.com/tensorflow/issues/42105', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xqfj-cr6q-pc8w', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29618'}
null
{'https://github.com/tensorflow/tensorflow/commit/1dc6a7ce6e0b3e27a7ae650bfc05b195ca793f88'}
{'https://github.com/tensorflow/tensorflow/commit/1dc6a7ce6e0b3e27a7ae650bfc05b195ca793f88'}
PyPI
PYSEC-2017-71
null
win_useradd, salt-cloud and the Linode driver in salt 2015.5.x before 2015.5.6, and 2015.8.x before 2015.8.1 leak password information in debug logs.
{'CVE-2015-6941'}
2021-07-25T23:34:53.862989Z
2017-08-09T16:29:00Z
null
null
null
{'https://docs.saltstack.com/en/latest/topics/releases/2015.5.6.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1273066', 'https://docs.saltstack.com/en/latest/topics/releases/2015.8.1.html', 'https://github.com/twangboy/salt/commit/c0689e32154c41f59840ae10ffc5fbfa30618710'}
null
{'https://github.com/twangboy/salt/commit/c0689e32154c41f59840ae10ffc5fbfa30618710'}
{'https://github.com/twangboy/salt/commit/c0689e32154c41f59840ae10ffc5fbfa30618710'}
PyPI
GHSA-cpqf-3c3r-c9g2
Cobbler before 3.3.0 allows log poisoning
Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.
{'CVE-2021-40323'}
2022-03-03T05:14:04.246526Z
2021-10-05T17:53:20Z
HIGH
null
{'CWE-94'}
{'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40323', 'https://github.com/cobbler/cobbler', 'https://github.com/cobbler/cobbler/releases/tag/v3.3.0'}
null
{'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a'}
{'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a'}
PyPI
PYSEC-2020-219
null
In wagtail-2fa before 1.4.1, any user with access to the CMS can view and delete other users 2FA devices by going to the correct path. The user does not require special permissions in order to do so. By deleting the other users device they can disable the target users 2FA devices and potentially compromise the account if they figure out their password. The problem has been patched in version 1.4.1.
{'GHSA-9gjv-6qq6-v7qm', 'CVE-2020-5240'}
2021-08-25T04:30:36.375287Z
2020-03-13T22:15:00Z
null
null
null
{'https://github.com/labd/wagtail-2fa/commit/ac23550d33b7436e90e3beea904647907eba5b74', 'https://github.com/labd/wagtail-2fa/security/advisories/GHSA-9gjv-6qq6-v7qm'}
null
{'https://github.com/labd/wagtail-2fa/commit/ac23550d33b7436e90e3beea904647907eba5b74'}
{'https://github.com/labd/wagtail-2fa/commit/ac23550d33b7436e90e3beea904647907eba5b74'}
PyPI
PYSEC-2021-649
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.AddManySparseToTensorsMap`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/kernels/sparse_tensors_map_ops.cc#L257) takes the values specified in `sparse_shape` as dimensions for the output shape. The `TensorShape` constructor(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L183-L188) uses a `CHECK` operation which triggers when `InitDims`(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L212-L296) returns a non-OK status. This is a legacy implementation of the constructor and operations should use `BuildTensorShapeBase` or `AddDimWithStatus` to prevent `CHECK`-failures in the presence of overflows. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-2cpx-427x-q2c6', 'CVE-2021-29523'}
2021-12-09T06:35:18.759879Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2cpx-427x-q2c6'}
null
{'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c'}
{'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c'}
PyPI
PYSEC-2021-219
null
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of validation in `tf.raw_ops.Dequantize`, an attacker can trigger a read from outside of bounds of heap allocated data. The implementation(https://github.com/tensorflow/tensorflow/blob/26003593aa94b1742f34dc22ce88a1e17776a67d/tensorflow/core/kernels/dequantize_op.cc#L106-L131) accesses the `min_range` and `max_range` tensors in parallel but fails to check that they have the same shape. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-c45w-2wxr-pp53', 'CVE-2021-29582'}
2021-08-27T03:22:35.924594Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/5899741d0421391ca878da47907b1452f06aaf1b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c45w-2wxr-pp53'}
null
{'https://github.com/tensorflow/tensorflow/commit/5899741d0421391ca878da47907b1452f06aaf1b'}
{'https://github.com/tensorflow/tensorflow/commit/5899741d0421391ca878da47907b1452f06aaf1b'}
PyPI
GHSA-gv26-jpj9-c8gq
Incomplete validation in `SparseSparseMinimum`
### Impact Incomplete validation in `SparseAdd` results in allowing attackers to exploit undefined behavior (dereferencing null pointers) as well as write outside of bounds of heap allocated data: ```python import tensorflow as tf a_indices = tf.ones([45, 92], dtype=tf.int64) a_values = tf.ones([45], dtype=tf.int64) a_shape = tf.ones([1], dtype=tf.int64) b_indices = tf.ones([1, 1], dtype=tf.int64) b_values = tf.ones([1], dtype=tf.int64) b_shape = tf.ones([1], dtype=tf.int64) tf.raw_ops.SparseSparseMinimum(a_indices=a_indices, a_values=a_values, a_shape=a_shape, b_indices=b_indices, b_values=b_values, b_shape=b_shape) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/656e7673b14acd7835dc778867f84916c6d1cac2/tensorflow/core/kernels/sparse_sparse_binary_op_shared.cc) has a large set of validation for the two sparse tensor inputs (6 tensors in total), but does not validate that the tensors are not empty or that the second dimension of `*_indices` matches the size of corresponding `*_shape`. This allows attackers to send tensor triples that represent invalid sparse tensors to abuse code assumptions that are not protected by validation. ### Patches We have patched the issue in GitHub commit [ba6822bd7b7324ba201a28b2f278c29a98edbef2](https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2) followed by GitHub commit [f6fde895ef9c77d848061c0517f19d0ec2682f3a](https://github.com/tensorflow/tensorflow/commit/f6fde895ef9c77d848061c0517f19d0ec2682f3a). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29607'}
2022-03-18T18:03:17.505392Z
2022-03-18T17:52:25Z
MODERATE
null
{'CWE-754'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29607', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gv26-jpj9-c8gq', 'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2', 'https://github.com/tensorflow/tensorflow/commit/f6fde895ef9c77d848061c0517f19d0ec2682f3a'}
null
{'https://github.com/tensorflow/tensorflow/commit/f6fde895ef9c77d848061c0517f19d0ec2682f3a', 'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2'}
{'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2', 'https://github.com/tensorflow/tensorflow/commit/f6fde895ef9c77d848061c0517f19d0ec2682f3a'}
PyPI
PYSEC-2021-537
null
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in `SparseAdd` results in allowing attackers to exploit undefined behavior (dereferencing null pointers) as well as write outside of bounds of heap allocated data. The implementation(https://github.com/tensorflow/tensorflow/blob/656e7673b14acd7835dc778867f84916c6d1cac2/tensorflow/core/kernels/sparse_add_op.cc) has a large set of validation for the two sparse tensor inputs (6 tensors in total), but does not validate that the tensors are not empty or that the second dimension of `*_indices` matches the size of corresponding `*_shape`. This allows attackers to send tensor triples that represent invalid sparse tensors to abuse code assumptions that are not protected by validation. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-cjc7-49v2-jp64', 'CVE-2021-29609'}
2021-12-09T06:35:00.330206Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc', 'https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cjc7-49v2-jp64'}
null
{'https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc', 'https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3'}
{'https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc', 'https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3'}
PyPI
PYSEC-2021-167
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a null pointer dereference by providing an invalid `permutation` to `tf.raw_ops.SparseMatrixSparseCholesky`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/080f1d9e257589f78b3ffb75debf584168aa6062/tensorflow/core/kernels/sparse/sparse_cholesky_op.cc#L85-L86) fails to properly validate the input arguments. Although `ValidateInputs` is called and there are checks in the body of this function, the code proceeds to the next line in `ValidateInputs` since `OP_REQUIRES`(https://github.com/tensorflow/tensorflow/blob/080f1d9e257589f78b3ffb75debf584168aa6062/tensorflow/core/framework/op_requires.h#L41-L48) is a macro that only exits the current function. Thus, the first validation condition that fails in `ValidateInputs` will cause an early return from that function. However, the caller will continue execution from the next line. The fix is to either explicitly check `context->status()` or to convert `ValidateInputs` to return a `Status`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'GHSA-xcwj-wfcm-m23c', 'CVE-2021-29530'}
2021-08-27T03:22:26.683297Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xcwj-wfcm-m23c', 'https://github.com/tensorflow/tensorflow/commit/e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd'}
null
{'https://github.com/tensorflow/tensorflow/commit/e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd'}
{'https://github.com/tensorflow/tensorflow/commit/e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd'}
PyPI
PYSEC-2021-472
null
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.QuantizeAndDequantizeV4Grad`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/95078c145b5a7a43ee046144005f733092756ab5/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L162-L163) does not validate the rank of the `input_*` tensors. In turn, this results in the tensors being passes as they are to `QuantizeAndDequantizePerChannelGradientImpl`(https://github.com/tensorflow/tensorflow/blob/95078c145b5a7a43ee046144005f733092756ab5/tensorflow/core/kernels/quantize_and_dequantize_op.h#L295-L306). However, the `vec<T>` method, requires the rank to 1 and triggers a `CHECK` failure otherwise. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 as this is the only other affected version.
{'CVE-2021-29544', 'GHSA-6g85-3hm8-83f9'}
2021-12-09T06:34:50.195889Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6g85-3hm8-83f9', 'https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b'}
null
{'https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b'}
{'https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b'}
PyPI
PYSEC-2021-188
null
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `MatrixTriangularSolve`(https://github.com/tensorflow/tensorflow/blob/8cae746d8449c7dda5298327353d68613f16e798/tensorflow/core/kernels/linalg/matrix_triangular_solve_op_impl.h#L160-L240) fails to terminate kernel execution if one validation condition fails. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
{'CVE-2021-29551', 'GHSA-vqw6-72r7-fgw7'}
2021-08-27T03:22:30.499582Z
2021-05-14T20:15:00Z
null
null
null
{'https://github.com/tensorflow/tensorflow/commit/480641e3599775a8895254ffbc0fc45621334f68', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vqw6-72r7-fgw7'}
null
{'https://github.com/tensorflow/tensorflow/commit/480641e3599775a8895254ffbc0fc45621334f68'}
{'https://github.com/tensorflow/tensorflow/commit/480641e3599775a8895254ffbc0fc45621334f68'}
PyPI
GHSA-p43w-g3c5-g5mq
Out of bounds read in Pillow
An issue was discovered in Pillow before 8.1.1. There is an out-of-bounds read in SGIRleDecode.c.
{'CVE-2021-25293'}
2022-03-03T05:13:17.214711Z
2021-03-29T16:35:27Z
HIGH
null
{'CWE-125'}
{'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25293', 'https://security.gentoo.org/glsa/202107-33', 'https://github.com/python-pillow/Pillow/commit/4853e522bddbec66022c0915b9a56255d0188bf9', 'https://github.com/python-pillow/Pillow'}
null
{'https://github.com/python-pillow/Pillow/commit/4853e522bddbec66022c0915b9a56255d0188bf9'}
{'https://github.com/python-pillow/Pillow/commit/4853e522bddbec66022c0915b9a56255d0188bf9'}
PyPI
GHSA-cmc7-mfmr-xqrx
Logic error in authentication in proxy.py
before_upstream_connection in AuthPlugin in http/proxy/auth.py in proxy.py before 2.3.1 accepts incorrect Proxy-Authorization header data because of a boolean confusion (and versus or).
{'CVE-2021-3116'}
2022-03-03T05:14:17.833004Z
2021-04-07T21:01:25Z
HIGH
null
{'CWE-480', 'CWE-287'}
{'https://pypi.org/project/proxy.py/2.3.1/#history', 'https://cardaci.xyz/advisories/2021/01/10/proxy.py-2.3.0-broken-basic-authentication/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3116', 'https://github.com/abhinavsingh/proxy.py/pull/482/commits/9b00093288237f5073c403f2c4f62acfdfa8ed46'}
null
{'https://github.com/abhinavsingh/proxy.py/pull/482/commits/9b00093288237f5073c403f2c4f62acfdfa8ed46'}
{'https://github.com/abhinavsingh/proxy.py/pull/482/commits/9b00093288237f5073c403f2c4f62acfdfa8ed46'}
PyPI
OSV-2021-955
Stack-buffer-overflow in Buffer_AppendIndentUnchecked
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009 ``` Crash type: Stack-buffer-overflow WRITE 1 Crash state: Buffer_AppendIndentUnchecked encode encode ```
null
2022-04-13T03:26:07.069166Z
2021-07-11T00:01:05.153778Z
HIGH
null
null
{'https://github.com/ultrajson/ultrajson/commit/5525f8c9ef8bb879dadd0eb942d524827d1b0362', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009'}
{'https://github.com/ultrajson/ultrajson/commit/a920bfa9d85bcd78836b866d1be80c1e3dcca1da'}
{'https://github.com/ultrajson/ultrajson/commit/5525f8c9ef8bb879dadd0eb942d524827d1b0362'}
{'https://github.com/ultrajson/ultrajson/commit/5525f8c9ef8bb879dadd0eb942d524827d1b0362'}
PyPI
GHSA-q8qj-fc9q-cphr
Undefined behavior in Tensorflow
### Impact If a user passes an invalid argument to `dlpack.to_dlpack` the expected validations will cause variables to bind to `nullptr` while setting a `status` variable to the error condition. However, this `status` argument is not properly checked: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L265-L267 Hence, code following these methods will bind references to null pointers: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L279-L285 This is undefined behavior and reported as an error if compiling with `-fsanitize=null`. ### Patches We have patched the issue in 22e07fb204386768e5bcbea563641ea11f96ceb8 and will release a patch release for all affected versions. We recommend users to upgrade to TensorFlow 2.2.1 or 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been discovered during variant analysis of [GHSA-rjjg-hgv6-h69v](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rjjg-hgv6-h69v).
{'CVE-2020-15191'}
2021-08-26T15:10:50Z
2020-09-25T18:28:25Z
MODERATE
null
{'CWE-20', 'CWE-252', 'CWE-476'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q8qj-fc9q-cphr', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15191', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}
null
{'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8'}
{'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8'}