ecosystem
stringclasses 11
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
220
⌀ | details
stringlengths 34
13.5k
| aliases
stringlengths 17
87
⌀ | modified_date
stringdate 2019-03-26 14:13:00
2022-05-10 08:46:52
| published_date
stringdate 2012-06-17 03:41:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 581
values | refs
stringlengths 82
11.6k
| introduced
stringclasses 843
values | code_refs
stringlengths 46
940
| commits
stringlengths 46
940
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
OSS-Fuzz | OSV-2020-110 | Heap-buffer-overflow in parquet::internal::RecordReader::Make | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20989
```
Crash type: Heap-buffer-overflow READ 8
Crash state:
parquet::internal::RecordReader::Make
parquet::arrow::LeafReader::LeafReader
parquet::arrow::GetReader
```
| null | 2022-04-13T03:04:32.083138Z | 2020-06-24T01:51:14.532580Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20989', 'https://github.com/apache/arrow/commit/6b87c6c9fb00ade7eff909afa4a6a61464cd516c'} | {'https://github.com/apache/arrow/commit/431fdbfbc0fb4bb16c4a89298404ad16784db2a0'} | {'https://github.com/apache/arrow/commit/6b87c6c9fb00ade7eff909afa4a6a61464cd516c'} | {'https://github.com/apache/arrow/commit/6b87c6c9fb00ade7eff909afa4a6a61464cd516c'} |
OSS-Fuzz | OSV-2020-76 | Heap-use-after-free in pixAverageRasterScans | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22760
```
Crash type: Heap-use-after-free READ 1
Crash state:
pixAverageRasterScans
pixExtractBarcodeCrossings
pixExtractBarcodeWidths1
```
| null | 2022-04-13T03:04:32.704451Z | 2020-06-24T01:51:13.003871Z | HIGH | null | null | {'https://github.com/DanBloomberg/leptonica/commit/7b5ba2afc759b7a44f6776a53030b494c6d985c3', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22760'} | {'https://github.com/DanBloomberg/leptonica/commit/f053b173bc94ef35a99ddf8eb608f63ae794b5fa'} | {'https://github.com/DanBloomberg/leptonica/commit/7b5ba2afc759b7a44f6776a53030b494c6d985c3'} | {'https://github.com/DanBloomberg/leptonica/commit/7b5ba2afc759b7a44f6776a53030b494c6d985c3'} |
OSS-Fuzz | OSV-2020-405 | Stack-buffer-overflow in ZSTD_decodeLiteralsBlock | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16445
```
Crash type: Stack-buffer-overflow WRITE {*}
Crash state:
ZSTD_decodeLiteralsBlock
ZSTD_decompressBlock
ZSTD_decompressDCtx
```
| null | 2022-04-13T03:19:42.457329Z | 2020-07-01T00:00:07.677115Z | HIGH | null | null | {'https://github.com/facebook/zstd/commit/a42bbb4e058063be8b61b3e00306eb6fb886a836', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16445'} | {'https://github.com/facebook/zstd/commit/610a81ecf9593893ed2f69718d3ecbd234297804'} | {'https://github.com/facebook/zstd/commit/a42bbb4e058063be8b61b3e00306eb6fb886a836'} | {'https://github.com/facebook/zstd/commit/a42bbb4e058063be8b61b3e00306eb6fb886a836'} |
OSS-Fuzz | OSV-2021-1311 | Null-dereference READ in unzOpenCurrentFile3 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38873
```
Crash type: Null-dereference READ
Crash state:
unzOpenCurrentFile3
unzOpenCurrentFile
Assimp::ZipFileInfo::Extract
```
| null | 2022-04-13T03:04:42.679623Z | 2021-09-18T00:00:37.776159Z | null | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38873', 'https://github.com/assimp/assimp/commit/310c81aaa20b7328ce7a354897db817f8becac3a'} | {'https://github.com/assimp/assimp/commit/8a975549a99bd21b7a2c09cc37b73e52a3919fed'} | {'https://github.com/assimp/assimp/commit/310c81aaa20b7328ce7a354897db817f8becac3a'} | {'https://github.com/assimp/assimp/commit/310c81aaa20b7328ce7a354897db817f8becac3a'} |
OSS-Fuzz | OSV-2018-156 | Heap-buffer-overflow in dotnet_parse_us | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11945
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
dotnet_parse_us
dotnet_parse_com
dotnet__load
```
| null | 2022-04-13T03:04:42.270609Z | 2021-01-13T00:01:07.126725Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11945', 'https://github.com/VirusTotal/yara/commit/7493247020e24407f120b6b29f6dd43c883e2f21'} | {'https://github.com/VirusTotal/yara/commit/aa182b4f928e54189fe51606d4dc419e7b27022f'} | {'https://github.com/VirusTotal/yara/commit/7493247020e24407f120b6b29f6dd43c883e2f21'} | {'https://github.com/VirusTotal/yara/commit/7493247020e24407f120b6b29f6dd43c883e2f21'} |
OSS-Fuzz | OSV-2020-956 | Heap-buffer-overflow in ndpi_workflow_process_packet | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20644
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
ndpi_workflow_process_packet
fuzz_ndpi_reader.c
HonggfuzzPersistentLoop
```
| null | 2022-04-13T03:04:35.902440Z | 2020-07-22T00:00:25.708813Z | MEDIUM | null | null | {'https://github.com/ntop/nDPI/commit/bf7dcd63c3a663cd0e1e8c567511ccfd8047d24a', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20644'} | {'https://github.com/ntop/nDPI/commit/98d9f524f9ff7746d0345939fe543020f8057212'} | {'https://github.com/ntop/nDPI/commit/bf7dcd63c3a663cd0e1e8c567511ccfd8047d24a'} | {'https://github.com/ntop/nDPI/commit/bf7dcd63c3a663cd0e1e8c567511ccfd8047d24a'} |
OSS-Fuzz | OSV-2020-1423 | Use-of-uninitialized-value in txt2sd | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22219
```
Crash type: Use-of-uninitialized-value
Crash state:
txt2sd
fuzz_mdns_xht.cc
txt2sd
```
| null | 2022-04-15T00:06:34.889356Z | 2020-07-28T00:00:16.191970Z | MEDIUM | null | null | {'https://github.com/open62541/open62541/commit/6f21ecb48a49fd292d568feb3751a50e51e083a3', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22219'} | {'https://github.com/open62541/open62541/commit/2919785d72474ed553317c4f3bafadf3e8c027f2', 'https://github.com/open62541/open62541/commit/798210374ad7a5fd43b31fc3c178a34a3ac21a0c'} | {'https://github.com/open62541/open62541/commit/6f21ecb48a49fd292d568feb3751a50e51e083a3'} | {'https://github.com/open62541/open62541/commit/6f21ecb48a49fd292d568feb3751a50e51e083a3'} |
OSS-Fuzz | OSV-2020-8 | Heap-buffer-overflow in findNextBorderPixel | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23433
```
Crash type: Heap-buffer-overflow READ 4
Crash state:
findNextBorderPixel
pixGetHoleBorder
pixGetCCBorders
```
| null | 2022-04-13T03:04:32.639074Z | 2020-06-24T01:51:09.673990Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23433', 'https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842'} | {'https://github.com/DanBloomberg/leptonica/commit/a53cfc7bd554dc4c2644b8f27ac5296fd926725f'} | {'https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842'} | {'https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842'} |
OSS-Fuzz | OSV-2021-242 | Heap-buffer-overflow in rans_uncompress_to_4x16 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29939
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
rans_uncompress_to_4x16
rans_decode
uncompress
```
| null | 2022-04-13T03:04:32.338631Z | 2021-01-26T23:45:33.235035Z | MEDIUM | null | null | {'https://github.com/samtools/htslib/commit/9d9e60c83487a8ac4644079e9636e34a9dd4bb08', 'https://github.com/samtools/htslib/commit/b8dcbd12b2c535fb792a5dfb275e875b626e929d', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29939'} | {'https://github.com/samtools/htslib/commit/0d1971cbebb269d90a563464e4f56987290e20ab'} | {'https://github.com/samtools/htslib/commit/9d9e60c83487a8ac4644079e9636e34a9dd4bb08', 'https://github.com/samtools/htslib/commit/b8dcbd12b2c535fb792a5dfb275e875b626e929d'} | {'https://github.com/samtools/htslib/commit/9d9e60c83487a8ac4644079e9636e34a9dd4bb08', 'https://github.com/samtools/htslib/commit/b8dcbd12b2c535fb792a5dfb275e875b626e929d'} |
OSS-Fuzz | OSV-2020-2018 | Heap-use-after-free in fpixChangeRefcount | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26260
```
Crash type: Heap-use-after-free READ 4
Crash state:
fpixChangeRefcount
fpixDestroy
fpix2_fuzzer.cc
```
| null | 2022-04-13T03:04:32.714945Z | 2020-10-12T00:00:40.582555Z | HIGH | null | null | {'https://github.com/DanBloomberg/leptonica/commit/7d0c940768fa3f7d07396dbae1d668cfded6bf05', 'https://github.com/DanBloomberg/leptonica/commit/20b8d16e4f3fa4d94b606a7f7804ee56c776768b', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26260'} | {'https://github.com/DanBloomberg/leptonica/commit/ef35b298c87cee04bf35dac4bc7c8c489d26fbc4'} | {'https://github.com/DanBloomberg/leptonica/commit/7d0c940768fa3f7d07396dbae1d668cfded6bf05', 'https://github.com/DanBloomberg/leptonica/commit/20b8d16e4f3fa4d94b606a7f7804ee56c776768b'} | {'https://github.com/DanBloomberg/leptonica/commit/7d0c940768fa3f7d07396dbae1d668cfded6bf05', 'https://github.com/DanBloomberg/leptonica/commit/20b8d16e4f3fa4d94b606a7f7804ee56c776768b'} |
OSS-Fuzz | OSV-2020-612 | Use-of-uninitialized-value in std::__1::vector<std::__1::vector<Sass::SharedImpl<Sass::ComplexSelector>, std:: | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18066
```
Crash type: Use-of-uninitialized-value
Crash state:
std::__1::vector<std::__1::vector<Sass::SharedImpl<Sass::ComplexSelector>, std::
Sass::ComplexSelector::resolve_parent_refs
Sass::Eval::operator
```
| null | 2022-04-13T03:04:38.465562Z | 2020-07-01T00:00:20.375619Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18066', 'https://github.com/sass/libsass/commit/4c83fdb0fe90432cc9b778d816ffd6859e34ef2d'} | {'https://github.com/sass/libsass/commit/f964dcddd76f4c1f00da06bfd905be790618c33b'} | {'https://github.com/sass/libsass/commit/4c83fdb0fe90432cc9b778d816ffd6859e34ef2d'} | {'https://github.com/sass/libsass/commit/4c83fdb0fe90432cc9b778d816ffd6859e34ef2d'} |
OSS-Fuzz | OSV-2020-242 | Heap-buffer-overflow in ndpi_workflow_process_packet | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20089
```
Crash type: Heap-buffer-overflow READ 2
Crash state:
ndpi_workflow_process_packet
fuzz_ndpi_reader.c
```
| null | 2022-04-13T03:04:36.221336Z | 2020-06-26T00:00:09.227452Z | MEDIUM | null | null | {'https://github.com/ntop/nDPI/commit/812505b56bb4508bc42e1615d6425ad26444d3f8', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20089'} | {'https://github.com/ntop/nDPI/commit/10738a0ca334104377e19a1e683bd13f2451a9e2'} | {'https://github.com/ntop/nDPI/commit/812505b56bb4508bc42e1615d6425ad26444d3f8'} | {'https://github.com/ntop/nDPI/commit/812505b56bb4508bc42e1615d6425ad26444d3f8'} |
OSS-Fuzz | OSV-2021-1805 | Heap-buffer-overflow in ndpi_search_kerberos | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43925
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
ndpi_search_kerberos
check_ndpi_detection_func
ndpi_check_flow_func
```
| null | 2022-04-13T03:04:36.014290Z | 2022-01-23T00:00:37.838585Z | MEDIUM | null | null | {'https://github.com/ntop/nDPI/commit/9dcc4a2334fa10d7d0a3c019ee35dfde4c06e044', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43925'} | {'https://github.com/ntop/nDPI/commit/ed51987e3a4838dd9aef27dfab2c0651f2f52836'} | {'https://github.com/ntop/nDPI/commit/9dcc4a2334fa10d7d0a3c019ee35dfde4c06e044'} | {'https://github.com/ntop/nDPI/commit/9dcc4a2334fa10d7d0a3c019ee35dfde4c06e044'} |
OSS-Fuzz | OSV-2020-307 | Heap-buffer-overflow in spng_decode_image | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16830
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
spng_decode_image
spng_read_fuzzer.cc
```
| null | 2022-04-13T03:04:33.693276Z | 2020-06-30T00:00:49.046191Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16830', 'https://github.com/randy408/libspng/commit/d7d4cced14f6107d05b52b5e7758207f79aa3465'} | {'https://github.com/randy408/libspng/commit/d48a9fa212cee4c05c51178b9c7813cd1299dcb3'} | {'https://github.com/randy408/libspng/commit/d7d4cced14f6107d05b52b5e7758207f79aa3465'} | {'https://github.com/randy408/libspng/commit/d7d4cced14f6107d05b52b5e7758207f79aa3465'} |
OSS-Fuzz | OSV-2021-1413 | UNKNOWN READ in helper_uc_tracecode | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39559
```
Crash type: UNKNOWN READ
Crash state:
helper_uc_tracecode
```
| null | 2022-04-13T03:26:07.599894Z | 2021-10-05T00:01:45.386128Z | MEDIUM | null | null | {'https://github.com/unicorn-engine/unicorn/commit/3fadb5aa5aad22926f5f816dbe396f8661990374', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39559'} | {'https://github.com/unicorn-engine/unicorn/commit/34ddafcbcf6d16508a63623a68715394ea4e12d8'} | {'https://github.com/unicorn-engine/unicorn/commit/3fadb5aa5aad22926f5f816dbe396f8661990374'} | {'https://github.com/unicorn-engine/unicorn/commit/3fadb5aa5aad22926f5f816dbe396f8661990374'} |
OSS-Fuzz | OSV-2021-757 | Use-of-uninitialized-value in nn_check_initialized | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34156
```
Crash type: Use-of-uninitialized-value
Crash state:
nn_check_initialized
nn_zero
ecgdsa_sign_raw
```
| null | 2022-04-13T03:04:31.416903Z | 2021-05-12T00:01:05.638739Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34156', 'https://github.com/ANSSI-FR/libecc/commit/d6cbbbb0c4afb6097dfea9eadf1516759dd337eb'} | {'https://github.com/ANSSI-FR/libecc/commit/f3abf297e84874278129fb91bc1b89356dd66627'} | {'https://github.com/ANSSI-FR/libecc/commit/d6cbbbb0c4afb6097dfea9eadf1516759dd337eb'} | {'https://github.com/ANSSI-FR/libecc/commit/d6cbbbb0c4afb6097dfea9eadf1516759dd337eb'} |
OSS-Fuzz | OSV-2021-307 | UNKNOWN READ in cpu_arm_exec_armeb | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30444
```
Crash type: UNKNOWN READ
Crash state:
cpu_arm_exec_armeb
resume_all_vcpus_armeb
vm_start_armeb
```
| null | 2022-04-13T03:27:15.927960Z | 2021-02-08T00:00:08.491999Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30444', 'https://github.com/unicorn-engine/unicorn/commit/7ca7e8a79d85ca57bb523be49009b0326b7a5210', 'https://github.com/unicorn-engine/unicorn/commit/e2a924a32b6fd3f24163b93996ac91782f518a25', 'https://github.com/unicorn-engine/unicorn/commit/34ddafcbcf6d16508a63623a68715394ea4e12d8'} | {'https://github.com/unicorn-engine/unicorn/commit/07f94ad1fc62293cac330df9714d739be6354926'} | {'https://github.com/unicorn-engine/unicorn/commit/34ddafcbcf6d16508a63623a68715394ea4e12d8', 'https://github.com/unicorn-engine/unicorn/commit/e2a924a32b6fd3f24163b93996ac91782f518a25', 'https://github.com/unicorn-engine/unicorn/commit/7ca7e8a79d85ca57bb523be49009b0326b7a5210'} | {'https://github.com/unicorn-engine/unicorn/commit/7ca7e8a79d85ca57bb523be49009b0326b7a5210', 'https://github.com/unicorn-engine/unicorn/commit/34ddafcbcf6d16508a63623a68715394ea4e12d8', 'https://github.com/unicorn-engine/unicorn/commit/e2a924a32b6fd3f24163b93996ac91782f518a25'} |
OSS-Fuzz | OSV-2020-1321 | UNKNOWN READ in FlowGetHash | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21479
```
Crash type: UNKNOWN READ
Crash state:
FlowGetHash
FlowSetupPacket
DecodeICMPV4
```
| null | 2022-04-13T03:04:32.748792Z | 2020-07-22T21:50:06.291563Z | MEDIUM | null | null | {'https://github.com/OISF/suricata/commit/8cbae1371f18d1427244f18fe2110256496a9f9f', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21479'} | {'https://github.com/OISF/suricata/commit/19fe8d9894207f18dbd305a5834820f3a698dc32'} | {'https://github.com/OISF/suricata/commit/8cbae1371f18d1427244f18fe2110256496a9f9f'} | {'https://github.com/OISF/suricata/commit/8cbae1371f18d1427244f18fe2110256496a9f9f'} |
OSS-Fuzz | OSV-2018-64 | Heap-buffer-overflow in BEInt<unsigned int, 4>::operator unsigned int | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11522
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
BEInt<unsigned int, 4>::operator unsigned int
void hb_sanitize_context_t::set_object<OT::KernSubTable<OT::KernAATSubTableHeade
AAT::KerxTable<OT::KernAAT>::sanitize
```
| null | 2022-04-13T03:04:32.803589Z | 2021-01-13T00:00:31.625117Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11522', 'https://github.com/harfbuzz/harfbuzz/commit/8dcc1913a1670ede7b124f7b5b775d7ab8791386'} | {'https://github.com/harfbuzz/harfbuzz/commit/758c9d68e2143493978d8ac8391f4af2a2abc26a'} | {'https://github.com/harfbuzz/harfbuzz/commit/8dcc1913a1670ede7b124f7b5b775d7ab8791386'} | {'https://github.com/harfbuzz/harfbuzz/commit/8dcc1913a1670ede7b124f7b5b775d7ab8791386'} |
OSS-Fuzz | OSV-2020-184 | Heap-buffer-overflow in file_strncmp | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23044
```
Crash type: Heap-buffer-overflow READ 13
Crash state:
file_strncmp
magiccheck
match
```
| null | 2022-04-13T03:04:30.870815Z | 2020-06-24T01:51:17.908691Z | MEDIUM | null | null | {'https://github.com/file/file/commit/3c6b51d4a1f5682f8144fef1553b0357d3d83aaf', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23044'} | {'https://github.com/file/file/commit/020876142969029eefc7a52d5545d0475203c472'} | {'https://github.com/file/file/commit/3c6b51d4a1f5682f8144fef1553b0357d3d83aaf'} | {'https://github.com/file/file/commit/3c6b51d4a1f5682f8144fef1553b0357d3d83aaf'} |
OSS-Fuzz | OSV-2021-887 | Use-after-poison in AK::RefPtr<AK::StringImpl, AK::RefPtrTraits<AK::StringImpl> >::RefPtr | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35436
```
Crash type: Use-after-poison WRITE 8
Crash state:
AK::RefPtr<AK::StringImpl, AK::RefPtrTraits<AK::StringImpl> >::RefPtr
AK::String::String
JS::abstract_relation
```
| null | 2022-04-13T03:04:32.211472Z | 2021-06-22T00:01:25.243822Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35436', 'https://github.com/SerenityOS/serenity/commit/5d24b5f4bec315cba22746f8a0985b1c0877a315'} | {'https://github.com/SerenityOS/serenity/commit/c31392510aa21d3ce5000f19a12dcf43abf9613d'} | {'https://github.com/SerenityOS/serenity/commit/5d24b5f4bec315cba22746f8a0985b1c0877a315'} | {'https://github.com/SerenityOS/serenity/commit/5d24b5f4bec315cba22746f8a0985b1c0877a315'} |
OSS-Fuzz | OSV-2020-2274 | Heap-buffer-overflow in McCopyWidthEq4_c | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28769
```
Crash type: Heap-buffer-overflow READ 4
Crash state:
McCopyWidthEq4_c
McCopy_sse2
McChroma_ssse3
```
| null | 2022-04-13T03:04:37.647508Z | 2020-12-19T00:00:41.113564Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28769', 'https://github.com/cisco/openh264/commit/f15f940425eebf24ce66984db2445733cf500b7b', 'https://github.com/cisco/openh264/commit/992c1c147175126c3fe7ab78216aa0395f9e6c71'} | {'https://github.com/cisco/openh264/commit/66ef706acd55b0b8daec32ca299d2586a1f473c9'} | {'https://github.com/cisco/openh264/commit/992c1c147175126c3fe7ab78216aa0395f9e6c71', 'https://github.com/cisco/openh264/commit/f15f940425eebf24ce66984db2445733cf500b7b'} | {'https://github.com/cisco/openh264/commit/f15f940425eebf24ce66984db2445733cf500b7b', 'https://github.com/cisco/openh264/commit/992c1c147175126c3fe7ab78216aa0395f9e6c71'} |
OSS-Fuzz | OSV-2021-1385 | Heap-buffer-overflow in Assimp::BaseImporter::ConvertToUTF8 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39339
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
Assimp::BaseImporter::ConvertToUTF8
Assimp::BaseImporter::TextFileToBuffer
Assimp::OpenGEX::OpenGEXImporter::InternReadFile
```
| null | 2022-04-13T03:04:42.673761Z | 2021-09-28T00:00:07.486971Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39339', 'https://github.com/assimp/assimp/commit/215f4e1f4dcca57f1dee9f18519df1af659ad62c'} | {'https://github.com/assimp/assimp/commit/8a975549a99bd21b7a2c09cc37b73e52a3919fed'} | {'https://github.com/assimp/assimp/commit/215f4e1f4dcca57f1dee9f18519df1af659ad62c'} | {'https://github.com/assimp/assimp/commit/215f4e1f4dcca57f1dee9f18519df1af659ad62c'} |
OSS-Fuzz | OSV-2021-868 | Heap-buffer-overflow in ndpi_set_detected_protocol | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35288
```
Crash type: Heap-buffer-overflow READ 4
Crash state:
ndpi_set_detected_protocol
ndpi_match_hostname_protocol
processClientServerHello
```
| null | 2022-04-13T03:04:36.145859Z | 2021-06-18T00:00:07.405397Z | MEDIUM | null | null | {'https://github.com/ntop/nDPI/commit/b0b3e1bc6c8db7cf8a2a26dbb29ffdb057d86121', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35288'} | {'https://github.com/ntop/nDPI/commit/be808c30f3f4582009df4c5efccd4f3bb0c6ef1d'} | {'https://github.com/ntop/nDPI/commit/b0b3e1bc6c8db7cf8a2a26dbb29ffdb057d86121'} | {'https://github.com/ntop/nDPI/commit/b0b3e1bc6c8db7cf8a2a26dbb29ffdb057d86121'} |
OSS-Fuzz | OSV-2020-1233 | Heap-buffer-overflow in getTLScertificate | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=19269
```
Crash type: Heap-buffer-overflow READ 6
Crash state:
getTLScertificate
tlsDetectProtocolFromCertificate
ndpi_search_tls_tcp_udp
```
| null | 2022-04-13T03:04:36.352534Z | 2020-07-22T21:49:58.860561Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=19269', 'https://github.com/ntop/nDPI/commit/6d7f3976f33b0d4fbbece60d6b7d549b13107674'} | {'https://github.com/ntop/nDPI/commit/e695dd6eade754b2d50bdf297ca8bdc4105f93ff'} | {'https://github.com/ntop/nDPI/commit/6d7f3976f33b0d4fbbece60d6b7d549b13107674'} | {'https://github.com/ntop/nDPI/commit/6d7f3976f33b0d4fbbece60d6b7d549b13107674'} |
OSS-Fuzz | OSV-2021-700 | UNKNOWN READ in ReadLEB_u32 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33749
```
Crash type: UNKNOWN READ
Crash state:
ReadLEB_u32
InitElements
Compile_ExtendedOpcode
```
| null | 2022-04-13T03:04:30.651451Z | 2021-04-29T00:00:12.162949Z | MEDIUM | null | null | {'https://github.com/wasm3/wasm3/commit/6bb612ccbfd5f8993a07a99092fab534722df1c3', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33749'} | {'https://github.com/wasm3/wasm3/commit/8cb2fd424309fa6ff70cf00bfcedc4e66d3355c0'} | {'https://github.com/wasm3/wasm3/commit/6bb612ccbfd5f8993a07a99092fab534722df1c3'} | {'https://github.com/wasm3/wasm3/commit/6bb612ccbfd5f8993a07a99092fab534722df1c3'} |
OSS-Fuzz | OSV-2020-700 | Stack-buffer-overflow in ot::Message::Write | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15380
```
Crash type: Stack-buffer-overflow READ {*}
Crash state:
ot::Message::Write
ot::Message::Append
ot::Mle::Mle::AppendResponse
```
| null | 2022-04-13T03:04:38.888636Z | 2020-07-01T00:00:25.618153Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15380', 'https://github.com/openthread/openthread/commit/8224b3c49f8bd285ad5658c1b3cd9683d6627bdb'} | {'https://github.com/openthread/openthread/commit/b694b00951eeeb4986387de1179d55dd38643a87'} | {'https://github.com/openthread/openthread/commit/8224b3c49f8bd285ad5658c1b3cd9683d6627bdb'} | {'https://github.com/openthread/openthread/commit/8224b3c49f8bd285ad5658c1b3cd9683d6627bdb'} |
OSS-Fuzz | OSV-2021-429 | Heap-buffer-overflow in blosc_d | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31170
```
Crash type: Heap-buffer-overflow READ 4
Crash state:
blosc_d
_blosc_getitem
blosc2_getitem_ctx
```
| null | 2022-04-13T03:04:40.451804Z | 2021-02-22T00:00:20.030600Z | HIGH | null | null | {'https://github.com/Blosc/c-blosc2/commit/cb44cf0fc82cf19efb002bba0eb5cc42e9527c3f', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31170'} | {'https://github.com/Blosc/c-blosc2/commit/861ba79f31393dec0a0782ca11cf32cebb6f6610'} | {'https://github.com/Blosc/c-blosc2/commit/cb44cf0fc82cf19efb002bba0eb5cc42e9527c3f'} | {'https://github.com/Blosc/c-blosc2/commit/cb44cf0fc82cf19efb002bba0eb5cc42e9527c3f'} |
OSS-Fuzz | OSV-2020-429 | Heap-buffer-overflow in MEM_read32 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14368
```
Crash type: Heap-buffer-overflow READ 4
Crash state:
MEM_read32
ZSTDv05_decodeSequence
ZSTDv05_decompressSequences
```
| null | 2022-04-13T03:04:31.653842Z | 2020-07-01T00:00:08.999234Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14368', 'https://github.com/facebook/zstd/commit/0fd322f812211e653a83492c0c114b933f8b6bc5'} | {'https://github.com/facebook/zstd/commit/610a81ecf9593893ed2f69718d3ecbd234297804'} | {'https://github.com/facebook/zstd/commit/0fd322f812211e653a83492c0c114b933f8b6bc5'} | {'https://github.com/facebook/zstd/commit/0fd322f812211e653a83492c0c114b933f8b6bc5'} |
OSS-Fuzz | OSV-2018-33 | Heap-buffer-overflow in yr_object_set_string | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14560
```
Crash type: Heap-buffer-overflow READ {*}
Crash state:
yr_object_set_string
dotnet_parse_us
dotnet_parse_com
```
| null | 2022-04-13T03:04:42.242196Z | 2021-01-13T00:00:14.651679Z | MEDIUM | null | null | {'https://github.com/VirusTotal/yara/commit/e83662f85c6f9534dc19e1a0cede55bebc64f21f', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14560'} | {'https://github.com/VirusTotal/yara/commit/aa182b4f928e54189fe51606d4dc419e7b27022f'} | {'https://github.com/VirusTotal/yara/commit/e83662f85c6f9534dc19e1a0cede55bebc64f21f'} | {'https://github.com/VirusTotal/yara/commit/e83662f85c6f9534dc19e1a0cede55bebc64f21f'} |
OSS-Fuzz | OSV-2022-67 | Heap-buffer-overflow in cli_bcomp_freemeta | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43816
```
Crash type: Heap-buffer-overflow READ 8
Crash state:
cli_bcomp_freemeta
cli_bcomp_addpatt
cli_parse_add
```
| null | 2022-04-13T03:04:39.425407Z | 2022-01-21T00:00:45.048694Z | MEDIUM | null | null | {'https://github.com/Cisco-Talos/clamav/commit/618e3b6bcfc2867a713d29a0696d9b87be197ed6', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43816'} | {'https://github.com/Cisco-Talos/clamav/commit/0037f5825b0b17a789c7eb29c9cb9a2d39c452bc'} | {'https://github.com/Cisco-Talos/clamav/commit/618e3b6bcfc2867a713d29a0696d9b87be197ed6'} | {'https://github.com/Cisco-Talos/clamav/commit/618e3b6bcfc2867a713d29a0696d9b87be197ed6'} |
OSS-Fuzz | OSV-2020-1819 | Heap-buffer-overflow in void cv::copyToMat<int> | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25779
```
Crash type: Heap-buffer-overflow READ 4
Crash state:
void cv::copyToMat<int>
cv::decodeSRGBData
cv::Jpeg2KOpjDecoder::readData
```
| null | 2022-04-13T03:04:31.501046Z | 2020-09-21T00:00:12.969129Z | MEDIUM | null | null | {'https://github.com/opencv/opencv/commit/f7b8f522ff4084d584628811a02a621736c3a731', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25779'} | {'https://github.com/opencv/opencv/commit/bfd056ceb1ad6529e1a2103f60e6f089c6b70109'} | {'https://github.com/opencv/opencv/commit/f7b8f522ff4084d584628811a02a621736c3a731'} | {'https://github.com/opencv/opencv/commit/f7b8f522ff4084d584628811a02a621736c3a731'} |
OSS-Fuzz | OSV-2018-195 | Heap-buffer-overflow in gmp_emsa_pkcs1_signature_data | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=10671
```
Crash type: Heap-buffer-overflow WRITE 1
Crash state:
gmp_emsa_pkcs1_signature_data
verify_emsa_pkcs1_signature
verify
```
| null | 2022-04-13T03:04:34.061437Z | 2021-01-13T00:01:21.218732Z | HIGH | null | null | {'https://github.com/strongswan/strongswan/commit/129ab919a8c3abfc17bea776f0774e0ccf33ca09', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=10671'} | {'https://github.com/strongswan/strongswan/commit/5955db5b124a1ee5f44c0845b6e00c86fddae67c'} | {'https://github.com/strongswan/strongswan/commit/129ab919a8c3abfc17bea776f0774e0ccf33ca09'} | {'https://github.com/strongswan/strongswan/commit/129ab919a8c3abfc17bea776f0774e0ccf33ca09'} |
OSS-Fuzz | OSV-2017-154 | Heap-buffer-overflow in TetrahedralInterpFloat | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=852
```
Crash type: Heap-buffer-overflow READ 4
Crash state:
TetrahedralInterpFloat
_LUTeval16
CachedXFORM
```
| null | 2022-04-13T03:04:33.907967Z | 2021-01-15T00:01:25.369737Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=852', 'https://github.com/mm2/Little-CMS/commit/76d1dccf3e5ce0c67125964d0908b322e7d1afb9'} | {'https://github.com/mm2/Little-CMS/commit/46a9220375da02b179bb6c0314b5cef40a433792'} | {'https://github.com/mm2/Little-CMS/commit/76d1dccf3e5ce0c67125964d0908b322e7d1afb9'} | {'https://github.com/mm2/Little-CMS/commit/76d1dccf3e5ce0c67125964d0908b322e7d1afb9'} |
OSS-Fuzz | OSV-2021-1452 | Heap-buffer-overflow in mrb_funcall_with_block | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39937
```
Crash type: Heap-buffer-overflow WRITE 8
Crash state:
mrb_funcall_with_block
mrb_instance_new
mrb_funcall_with_block
```
| null | 2022-04-13T03:04:39.698442Z | 2021-10-15T00:00:40.001741Z | HIGH | null | null | {'https://github.com/mruby/mruby/commit/7010ed0f0a414b1367e4620a504f106759341cc2', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39937'} | {'https://github.com/mruby/mruby/commit/dccd66f9efecd0a974b735c62836fe566015cf37'} | {'https://github.com/mruby/mruby/commit/7010ed0f0a414b1367e4620a504f106759341cc2'} | {'https://github.com/mruby/mruby/commit/7010ed0f0a414b1367e4620a504f106759341cc2'} |
OSS-Fuzz | OSV-2020-1730 | Bad-cast to RDKit::Atom | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25547
```
Crash type: Bad-cast
Crash state:
Bad-cast to RDKit::Atom
```
| null | 2022-04-13T03:04:41.515246Z | 2020-09-11T00:00:51.334144Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25547', 'https://github.com/rdkit/rdkit/commit/759b7a4b603c8a3c4bbb8bc31594bbab501094e3'} | {'https://github.com/rdkit/rdkit/commit/a9010da8a4af17479c706f2cf4e8c6acdc1585ce'} | {'https://github.com/rdkit/rdkit/commit/759b7a4b603c8a3c4bbb8bc31594bbab501094e3'} | {'https://github.com/rdkit/rdkit/commit/759b7a4b603c8a3c4bbb8bc31594bbab501094e3'} |
OSS-Fuzz | OSV-2020-1049 | Heap-use-after-free in WelsDec::WelsReorderRefList | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14027
```
Crash type: Heap-use-after-free READ 4
Crash state:
WelsDec::WelsReorderRefList
WelsDec::InitRefPicList
WelsDec::DecodeCurrentAccessUnit
```
| null | 2022-04-13T03:04:37.547498Z | 2020-07-22T21:49:43.177956Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14027', 'https://github.com/cisco/openh264/commit/519b0ff554e9713198bc3b3185da809be42be20c'} | {'https://github.com/cisco/openh264/commit/70eeb783515dbfee3e0c781d6667838caba5113b'} | {'https://github.com/cisco/openh264/commit/519b0ff554e9713198bc3b3185da809be42be20c'} | {'https://github.com/cisco/openh264/commit/519b0ff554e9713198bc3b3185da809be42be20c'} |
OSS-Fuzz | OSV-2020-829 | Heap-use-after-free in check_content_type_and_change_protocol | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23834
```
Crash type: Heap-use-after-free READ 2
Crash state:
check_content_type_and_change_protocol
ndpi_check_http_tcp
ndpi_search_http_tcp
```
| null | 2022-04-13T03:04:36.363405Z | 2020-07-14T05:37:49.889652Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23834', 'https://github.com/ntop/nDPI/commit/d6a97219ea14f0eb4d7d0831d4aefc971878caae'} | {'https://github.com/ntop/nDPI/commit/812505b56bb4508bc42e1615d6425ad26444d3f8'} | {'https://github.com/ntop/nDPI/commit/d6a97219ea14f0eb4d7d0831d4aefc971878caae'} | {'https://github.com/ntop/nDPI/commit/d6a97219ea14f0eb4d7d0831d4aefc971878caae'} |
OSS-Fuzz | OSV-2020-254 | Heap-buffer-overflow in pixReadFromTiffStream | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
pixReadFromTiffStream
pixReadMemTiff
pixReadMem
```
| null | 2022-04-13T03:04:32.633763Z | 2020-06-26T00:00:11.669926Z | MEDIUM | null | null | {'https://github.com/DanBloomberg/leptonica/commit/8466a469b8c3a8d521f0fced041f8c5367eac21e', 'https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23654'} | {'https://github.com/DanBloomberg/leptonica/commit/26425b91ea850552d11af0ead0557eb0a328785f'} | {'https://github.com/DanBloomberg/leptonica/commit/8466a469b8c3a8d521f0fced041f8c5367eac21e', 'https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c'} | {'https://github.com/DanBloomberg/leptonica/commit/8466a469b8c3a8d521f0fced041f8c5367eac21e', 'https://github.com/DanBloomberg/leptonica/commit/5ba34b1fe741d69d43a6c8cf767756997eadd87c'} |
OSS-Fuzz | OSV-2017-41 | Heap-buffer-overflow in OSS_FUZZ_png_combine_row | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3606
```
Crash type: Heap-buffer-overflow WRITE 4
Crash state:
OSS_FUZZ_png_combine_row
OSS_FUZZ_png_read_row
_start
```
| null | 2022-04-13T03:04:35.564255Z | 2021-01-13T21:56:05.092063Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3606', 'https://github.com/glennrp/libpng/commit/a3d1057a735d923626f1f6bdc0f662a13d0cba6f'} | {'https://github.com/glennrp/libpng/commit/ab791fc9d69580c1982af726c9f61b533357234f'} | {'https://github.com/glennrp/libpng/commit/a3d1057a735d923626f1f6bdc0f662a13d0cba6f'} | {'https://github.com/glennrp/libpng/commit/a3d1057a735d923626f1f6bdc0f662a13d0cba6f'} |
OSS-Fuzz | OSV-2020-604 | UNKNOWN READ in Sass::Parser::parseCompoundSelector | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15904
```
Crash type: UNKNOWN READ
Crash state:
Sass::Parser::parseCompoundSelector
Sass::Parser::parseComplexSelector
Sass::Parser::parseSelectorList
```
| null | 2022-04-13T03:04:38.493199Z | 2020-07-01T00:00:19.975718Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15904', 'https://github.com/sass/libsass/commit/994695c669085058c4a500f295a0531893eff77a'} | {'https://github.com/sass/libsass/commit/f964dcddd76f4c1f00da06bfd905be790618c33b'} | {'https://github.com/sass/libsass/commit/994695c669085058c4a500f295a0531893eff77a'} | {'https://github.com/sass/libsass/commit/994695c669085058c4a500f295a0531893eff77a'} |
OSS-Fuzz | OSV-2020-1272 | Heap-buffer-overflow in ASN1_get_object | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13803
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
ASN1_get_object
asn1_check_tlen
asn1_item_ex_d2i
```
| null | 2022-04-13T03:04:38.807734Z | 2020-07-22T21:50:02.220943Z | MEDIUM | null | null | {'https://github.com/libressl-portable/portable/commit/2f7827344a0234320c7ad8d2fc2418e9d8a586c9', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13803'} | {'https://github.com/libressl-portable/portable/commit/4ea2a01a0d2cc889e95316f51c7a36f8f158df44'} | {'https://github.com/libressl-portable/portable/commit/2f7827344a0234320c7ad8d2fc2418e9d8a586c9'} | {'https://github.com/libressl-portable/portable/commit/2f7827344a0234320c7ad8d2fc2418e9d8a586c9'} |
OSS-Fuzz | OSV-2022-318 | UNKNOWN READ | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46356
```
Crash type: UNKNOWN READ
Crash state:
NULL```
| null | 2022-04-13T03:04:38.037322Z | 2022-04-07T00:01:51.631058Z | MEDIUM | null | null | {'https://github.com/libvips/libvips/commit/2dc319b1b1610e4c8ae95b8ca47b46926cd41ce1', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46356'} | {'https://github.com/libvips/libvips/commit/9228e50f46b79dc448b9416a5ae1dfdcfdfcf98c'} | {'https://github.com/libvips/libvips/commit/2dc319b1b1610e4c8ae95b8ca47b46926cd41ce1'} | {'https://github.com/libvips/libvips/commit/2dc319b1b1610e4c8ae95b8ca47b46926cd41ce1'} |
OSS-Fuzz | OSV-2021-1540 | Heap-buffer-overflow in consume_list | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=40723
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
consume_list
pn_amqp_decode_DqEoQBIoIe
pn_message_decode
```
| null | 2022-04-13T03:04:36.938644Z | 2021-11-06T00:01:33.530210Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=40723', 'https://github.com/apache/qpid-proton/commit/b788baad3e9d9ba028d3d115e272e94a30227e17'} | {'https://github.com/apache/qpid-proton/commit/72c87537a136dbfc63a0c811d159631ecd0e3986'} | {'https://github.com/apache/qpid-proton/commit/b788baad3e9d9ba028d3d115e272e94a30227e17'} | {'https://github.com/apache/qpid-proton/commit/b788baad3e9d9ba028d3d115e272e94a30227e17'} |
OSS-Fuzz | OSV-2021-1055 | UNKNOWN WRITE in jxl::ModularFrameDecoder::DecodeGroup | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36456
```
Crash type: UNKNOWN WRITE
Crash state:
jxl::ModularFrameDecoder::DecodeGroup
jxl::FrameDecoder::ProcessACGroup
jxl::ThreadPool::RunCallState<jxl::FrameDecoder::ProcessSections
```
| null | 2022-04-13T03:30:05.347108Z | 2021-07-25T00:00:32.621715Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36456', 'https://github.com/libvips/libvips/commit/86466a9b9ab37c0f469d84797d477260aa669cfa'} | {'https://github.com/libvips/libvips/commit/813a5f84cf94c9e7c0fe9b043c545500aef11411'} | {'https://github.com/libvips/libvips/commit/86466a9b9ab37c0f469d84797d477260aa669cfa'} | {'https://github.com/libvips/libvips/commit/86466a9b9ab37c0f469d84797d477260aa669cfa'} |
OSS-Fuzz | OSV-2021-891 | Heap-buffer-overflow in __cil_cat_expr_range_to_bitmap_helper | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35492
```
Crash type: Heap-buffer-overflow READ 4
Crash state:
__cil_cat_expr_range_to_bitmap_helper
__cil_expr_to_bitmap
__evaluate_cat_expression
```
| null | 2022-04-13T03:04:42.328918Z | 2021-06-24T00:00:40.542962Z | MEDIUM | null | null | {'https://github.com/SELinuxProject/selinux/commit/8470058934e89d1876b8e034d1ea818bde62b994', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35492'} | {'https://github.com/SELinuxProject/selinux/commit/982ec302b67f3c7f8df667dadb67352b1e4a6d18'} | {'https://github.com/SELinuxProject/selinux/commit/8470058934e89d1876b8e034d1ea818bde62b994'} | {'https://github.com/SELinuxProject/selinux/commit/8470058934e89d1876b8e034d1ea818bde62b994'} |
OSS-Fuzz | OSV-2020-468 | Stack-buffer-overflow in ot::Ip6::Address::FromString | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14821
```
Crash type: Stack-buffer-overflow WRITE 1
Crash state:
ot::Ip6::Address::FromString
ot::Cli::Coap::ProcessRequest
ot::Cli::Interpreter::ProcessCoap
```
| null | 2022-04-13T03:04:38.893804Z | 2020-07-01T00:00:11.286088Z | HIGH | null | null | {'https://github.com/openthread/openthread/commit/8bb50d4ccde667295f892f976ee5ff90ba4a4a2f', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14821'} | {'https://github.com/openthread/openthread/commit/1a4b249a9527c88ea2f573fea9fda39bb025b5b1'} | {'https://github.com/openthread/openthread/commit/8bb50d4ccde667295f892f976ee5ff90ba4a4a2f'} | {'https://github.com/openthread/openthread/commit/8bb50d4ccde667295f892f976ee5ff90ba4a4a2f'} |
OSS-Fuzz | OSV-2020-487 | UNKNOWN READ in crc32 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15278
```
Crash type: UNKNOWN READ
Crash state:
crc32
update_crc
push_data_ready
```
| null | 2022-04-13T03:04:41.162898Z | 2020-07-01T00:00:12.477818Z | MEDIUM | null | null | {'https://github.com/libarchive/libarchive/commit/47bb8187d3ef2d49ee8c7841cb2872b3cfa1f6f7', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15278'} | {'https://github.com/libarchive/libarchive/commit/4bd12b6f40cb4413c8970c52f15f3b6885b5e32f'} | {'https://github.com/libarchive/libarchive/commit/47bb8187d3ef2d49ee8c7841cb2872b3cfa1f6f7'} | {'https://github.com/libarchive/libarchive/commit/47bb8187d3ef2d49ee8c7841cb2872b3cfa1f6f7'} |
OSS-Fuzz | OSV-2021-487 | UNKNOWN READ in blosc_run_decompression_with_context | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31611
```
Crash type: UNKNOWN READ
Crash state:
blosc_run_decompression_with_context
blosc2_decompress_ctx
frame_decompress_chunk
```
| null | 2022-04-13T03:04:40.286519Z | 2021-03-04T00:02:22.600849Z | MEDIUM | null | null | {'https://github.com/Blosc/c-blosc2/commit/cf02dfc992ae5544c92f69befc7093aacf168e77', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31611'} | {'https://github.com/Blosc/c-blosc2/commit/861ba79f31393dec0a0782ca11cf32cebb6f6610'} | {'https://github.com/Blosc/c-blosc2/commit/cf02dfc992ae5544c92f69befc7093aacf168e77'} | {'https://github.com/Blosc/c-blosc2/commit/cf02dfc992ae5544c92f69befc7093aacf168e77'} |
PyPI | GHSA-mq5c-prh3-3f3h | Invalid validation in `QuantizeAndDequantizeV2` | ### Impact
The validation in `tf.raw_ops.QuantizeAndDequantizeV2` allows invalid values for `axis` argument:
```python
import tensorflow as tf
input_tensor = tf.constant([0.0], shape=[1], dtype=float)
input_min = tf.constant(-10.0)
input_max = tf.constant(-10.0)
tf.raw_ops.QuantizeAndDequantizeV2(
input=input_tensor, input_min=input_min, input_max=input_max,
signed_input=False, num_bits=1, range_given=False, round_mode='HALF_TO_EVEN',
narrow_range=False, axis=-2)
```
The [validation](https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L74-L77) uses `||` to mix two different conditions:
```cc
OP_REQUIRES(ctx,
(axis_ == -1 || axis_ < input.shape().dims()),
errors::InvalidArgument(...));
```
If `axis_ < -1` the condition in `OP_REQUIRES` will still be true, but this value of `axis_` results in heap underflow. This allows attackers to read/write to other data on the heap.
### Patches
We have patched the issue in GitHub commit [c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9](https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29610'} | 2022-03-03T05:14:14.075606Z | 2021-05-21T14:28:32Z | LOW | null | {'CWE-665'} | {'https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29610', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mq5c-prh3-3f3h'} | null | {'https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9'} | {'https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9'} |
PyPI | PYSEC-2021-171 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.SparseConcat`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/b432a38fe0e1b4b904a6c222cbce794c39703e87/tensorflow/core/kernels/sparse_concat_op.cc#L76) takes the values specified in `shapes[0]` as dimensions for the output shape. The `TensorShape` constructor(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L183-L188) uses a `CHECK` operation which triggers when `InitDims`(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L212-L296) returns a non-OK status. This is a legacy implementation of the constructor and operations should use `BuildTensorShapeBase` or `AddDimWithStatus` to prevent `CHECK`-failures in the presence of overflows. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'CVE-2021-29534', 'GHSA-6j9c-grc6-5m6g'} | 2021-08-27T03:22:27.421981Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6j9c-grc6-5m6g'} | null | {'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c'} | {'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c'} |
PyPI | PYSEC-2021-521 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `BatchToSpaceNd` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/b5ed552fe55895aee8bd8b191f744a069957d18d/tensorflow/lite/kernels/batch_to_space_nd.cc#L81-L82). An attacker can craft a model such that one dimension of the `block` input is 0. Hence, the corresponding value in `block_shape` is 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-cfx7-2xpc-8w4h', 'CVE-2021-29593'} | 2021-12-09T06:34:57.775345Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfx7-2xpc-8w4h', 'https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044'} | null | {'https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044'} | {'https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044'} |
PyPI | PYSEC-2021-464 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow in `QuantizedReshape` by passing in invalid thresholds for the quantization. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/a324ac84e573fba362a5e53d4e74d5de6729933e/tensorflow/core/kernels/quantized_reshape_op.cc#L38-L55) assumes that the 2 arguments are always valid scalars and tries to access the numeric value directly. However, if any of these tensors is empty, then `.flat<T>()` is an empty buffer and accessing the element at position 0 results in overflow. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'CVE-2021-29536', 'GHSA-2gfx-95x2-5v3x'} | 2021-12-09T06:34:48.953620Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2gfx-95x2-5v3x'} | null | {'https://github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e'} | {'https://github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e'} |
PyPI | PYSEC-2022-57 | null | Tensorflow is an Open Source Machine Learning Framework. The implementation of `StringNGrams` can be used to trigger a denial of service attack by causing an out of memory condition after an integer overflow. We are missing a validation on `pad_witdh` and that result in computing a negative value for `ngram_width` which is later used to allocate parts of the output. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | {'GHSA-98j8-c9q4-r38g', 'CVE-2022-21733'} | 2022-03-09T00:17:30.939427Z | 2022-02-03T12:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/string_ngrams_op.cc#L29-L161', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-98j8-c9q4-r38g'} | null | {'https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8'} | {'https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8'} |
PyPI | PYSEC-2019-137 | null | Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-Encoding should be a comma separated list, with the inner-most encoding first, followed by any further transfer codings, ending with chunked. Requests sent with: "Transfer-Encoding: gzip, chunked" would incorrectly get ignored, and the request would use a Content-Length header instead to determine the body size of the HTTP message. This could allow for Waitress to treat a single request as multiple requests in the case of HTTP pipelining. This issue is fixed in Waitress 1.4.0. | {'CVE-2019-16786', 'GHSA-g2xc-35jw-c63p'} | 2020-02-25T17:15:00Z | 2019-12-20T23:15:00Z | null | null | null | {'https://access.redhat.com/errata/RHSA-2020:0720', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5/', 'https://github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3', 'https://github.com/Pylons/waitress/security/advisories/GHSA-g2xc-35jw-c63p', 'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes'} | null | {'https://github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3'} | {'https://github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3'} |
PyPI | GHSA-qg48-85hg-mqc5 | Division by 0 in `DenseCountSparseOutput` | ### Impact
An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.DenseCountSparseOutput`:
```python
import tensorflow as tf
values = tf.constant([], shape=[0, 0], dtype=tf.int64)
weights = tf.constant([])
tf.raw_ops.DenseCountSparseOutput(
values=values, weights=weights,
minlength=-1, maxlength=58, binary_output=True)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/efff014f3b2d8ef6141da30c806faf141297eca1/tensorflow/core/kernels/count_ops.cc#L123-L127) computes a divisor value from user data but does not check that the result is 0 before doing the division:
```cc
int num_batch_elements = 1;
for (int i = 0; i < num_batch_dimensions; ++i) {
num_batch_elements *= data.shape().dim_size(i);
}
int num_value_elements = data.shape().num_elements() / num_batch_elements;
```
Since `data` is given by the `values` argument, `num_batch_elements` is 0.
### Patches
We have patched the issue in GitHub commit [da5ff2daf618591f64b2b62d9d9803951b945e9f](https://github.com/tensorflow/tensorflow/commit/da5ff2daf618591f64b2b62d9d9803951b945e9f).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, and TensorFlow 2.3.3, as these are also affected.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29554'} | 2022-03-03T05:14:16.368742Z | 2021-05-21T14:23:55Z | LOW | null | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qg48-85hg-mqc5', 'https://github.com/tensorflow/tensorflow/commit/da5ff2daf618591f64b2b62d9d9803951b945e9f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29554'} | null | {'https://github.com/tensorflow/tensorflow/commit/da5ff2daf618591f64b2b62d9d9803951b945e9f'} | {'https://github.com/tensorflow/tensorflow/commit/da5ff2daf618591f64b2b62d9d9803951b945e9f'} |
PyPI | PYSEC-2018-8 | null | io/mongo/parser.py in Eve (aka pyeve) before 0.7.5 allows remote attackers to execute arbitrary code via Code Injection in the where parameter. | {'GHSA-8jxq-75rw-fhj9', 'CVE-2018-8097'} | 2021-06-10T06:51:29.570871Z | 2018-03-14T12:29:00Z | null | null | null | {'https://github.com/pyeve/eve/commit/f8f7019ffdf9b4e05faf95e1f04e204aa4c91f98', 'https://github.com/pyeve/eve/issues/1101', 'https://github.com/advisories/GHSA-8jxq-75rw-fhj9'} | null | {'https://github.com/pyeve/eve/commit/f8f7019ffdf9b4e05faf95e1f04e204aa4c91f98'} | {'https://github.com/pyeve/eve/commit/f8f7019ffdf9b4e05faf95e1f04e204aa4c91f98'} |
PyPI | GHSA-3rcw-9p9x-582v | Code injection in `saved_model_cli` | ### Impact
TensorFlow's `saved_model_cli` tool is vulnerable to a code injection as it [calls `eval` on user supplied strings](https://github.com/tensorflow/tensorflow/blob/87462bfac761435a46641ff2f10ad0b6e5414a4b/tensorflow/python/tools/saved_model_cli.py#L524-L550)
```python
def preprocess_input_exprs_arg_string(input_exprs_str):
...
for input_raw in filter(bool, input_exprs_str.split(';')):
...
input_key, expr = input_raw.split('=', 1)
input_dict[input_key] = eval(expr)
...
```
This can be used by attackers to run arbitrary code on the plaform where the CLI tool runs.
However, given that the tool is always run manually, the impact of this is not severe. We have patched this by adding a `safe` flag which defaults to `True` and an explicit warning for users.
### Patches
We have patched the issue in GitHub commit [8b202f08d52e8206af2bdb2112a62fafbc546ec7](https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Omer Kaspi from Vdoo. | {'CVE-2021-41228'} | 2022-03-03T05:13:08.134086Z | 2021-11-10T16:54:02Z | HIGH | null | {'CWE-78', 'CWE-94'} | {'https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7', 'https://github.com/tensorflow/tensorflow', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41228', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3rcw-9p9x-582v'} | null | {'https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7'} | {'https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7'} |
PyPI | PYSEC-2017-30 | null | modules/chef.py in SaltStack before 2014.7.4 does not properly handle files in /tmp. | {'CVE-2015-1839'} | 2021-07-05T00:01:26.213768Z | 2017-04-13T14:59:00Z | null | null | null | {'https://docs.saltstack.com/en/latest/topics/releases/2014.7.4.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1212788', 'https://github.com/saltstack/salt/commit/b49d0d4b5ca5c6f31f03e2caf97cef1088eeed81', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175568.html', 'https://github.com/saltstack/salt/commit/22d2f7a1ec93300c34e8c42d14ec39d51e610b5c'} | null | {'https://github.com/saltstack/salt/commit/22d2f7a1ec93300c34e8c42d14ec39d51e610b5c', 'https://github.com/saltstack/salt/commit/b49d0d4b5ca5c6f31f03e2caf97cef1088eeed81'} | {'https://github.com/saltstack/salt/commit/b49d0d4b5ca5c6f31f03e2caf97cef1088eeed81', 'https://github.com/saltstack/salt/commit/22d2f7a1ec93300c34e8c42d14ec39d51e610b5c'} |
PyPI | PYSEC-2020-258 | null | In TensorFlow before 1.15.2 and 2.0.1, converting a string (from Python) to a tf.float16 value results in a segmentation fault in eager mode as the format checks for this use case are only in the graph mode. This issue can lead to denial of service in inference/training where a malicious attacker can send a data point which contains a string instead of a tf.float16 value. Similar effects can be obtained by manipulating saved models and checkpoints whereby replacing a scalar tf.float16 value with a scalar string will trigger this issue due to automatic conversions. This can be easily reproduced by tf.constant("hello", tf.float16), if eager execution is enabled. This issue is patched in TensorFlow 1.15.1 and 2.0.1 with this vulnerability patched. TensorFlow 2.1.0 was released after we fixed the issue, thus it is not affected. Users are encouraged to switch to TensorFlow 1.15.1, 2.0.1 or 2.1.0. | {'GHSA-977j-xj7q-2jr9', 'CVE-2020-5215'} | 2021-08-27T03:22:23.423115Z | 2020-01-28T22:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-977j-xj7q-2jr9', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.0.1', 'https://github.com/tensorflow/tensorflow/commit/5ac1b9e24ff6afc465756edf845d2e9660bd34bf', 'https://github.com/tensorflow/tensorflow/releases/tag/v1.15.2'} | null | {'https://github.com/tensorflow/tensorflow/commit/5ac1b9e24ff6afc465756edf845d2e9660bd34bf'} | {'https://github.com/tensorflow/tensorflow/commit/5ac1b9e24ff6afc465756edf845d2e9660bd34bf'} |
PyPI | PYSEC-2021-608 | null | TensorFlow is an open source platform for machine learning. In affected versions if `tf.tile` is called with a large input argument then the TensorFlow process will crash due to a `CHECK`-failure caused by an overflow. The number of elements in the output tensor is too much for the `int64_t` type and the overflow is detected via a `CHECK` statement. This aborts the process. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {'GHSA-2p25-55c9-h58q', 'CVE-2021-41198'} | 2021-12-09T06:35:07.301547Z | 2021-11-05T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f', 'https://github.com/tensorflow/tensorflow/issues/46911', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2p25-55c9-h58q'} | null | {'https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f'} | {'https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f'} |
PyPI | PYSEC-2021-47 | null | Pydantic is a data validation and settings management using Python type hinting. In affected versions passing either `'infinity'`, `'inf'` or `float('inf')` (or their negatives) to `datetime` or `date` fields causes validation to run forever with 100% CPU usage (on one CPU). Pydantic has been patched with fixes available in the following versions: v1.8.2, v1.7.4, v1.6.2. All these versions are available on pypi(https://pypi.org/project/pydantic/#history), and will be available on conda-forge(https://anaconda.org/conda-forge/pydantic) soon. See the changelog(https://pydantic-docs.helpmanual.io/) for details. If you absolutely can't upgrade, you can work around this risk using a validator(https://pydantic-docs.helpmanual.io/usage/validators/) to catch these values. This is not an ideal solution (in particular you'll need a slightly different function for datetimes), instead of a hack like this you should upgrade pydantic. If you are not using v1.8.x, v1.7.x or v1.6.x and are unable to upgrade to a fixed version of pydantic, please create an issue at https://github.com/samuelcolvin/pydantic/issues requesting a back-port, and we will endeavour to release a patch for earlier versions of pydantic. | {'GHSA-5jqp-qgf6-3pvh', 'CVE-2021-29510'} | 2021-05-13T19:15:00Z | 2021-05-13T19:15:00Z | null | null | null | {'https://github.com/samuelcolvin/pydantic/security/advisories/GHSA-5jqp-qgf6-3pvh', 'https://github.com/samuelcolvin/pydantic/commit/7e83fdd2563ffac081db7ecdf1affa65ef38c468'} | null | {'https://github.com/samuelcolvin/pydantic/commit/7e83fdd2563ffac081db7ecdf1affa65ef38c468'} | {'https://github.com/samuelcolvin/pydantic/commit/7e83fdd2563ffac081db7ecdf1affa65ef38c468'} |
PyPI | PYSEC-2021-258 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of `tf.raw_ops.SparseDenseCwiseDiv` is vulnerable to a division by 0 error. The [implementation](https://github.com/tensorflow/tensorflow/blob/a1bc56203f21a5a4995311825ffaba7a670d7747/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc#L56) uses a common class for all binary operations but fails to treat the division by 0 case separately. We have patched the issue in GitHub commit d9204be9f49520cdaaeb2541d1dc5187b23f31d9. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'CVE-2021-37636', 'GHSA-hp4c-x6r7-6555'} | 2021-08-27T03:22:42.737707Z | 2021-08-12T18:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hp4c-x6r7-6555'} | null | {'https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9'} | {'https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9'} |
PyPI | PYSEC-2021-576 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions due to incomplete validation in `tf.raw_ops.QuantizeV2`, an attacker can trigger undefined behavior via binding a reference to a null pointer or can access data outside the bounds of heap allocated arrays. The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/quantize_op.cc#L59) has some validation but does not check that `min_range` and `max_range` both have the same non-zero number of elements. If `axis` is provided (i.e., not `-1`), then validation should check that it is a value in range for the rank of `input` tensor and then the lengths of `min_range` and `max_range` inputs match the `axis` dimension of the `input` tensor. We have patched the issue in GitHub commit 6da6620efad397c85493b8f8667b821403516708. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'GHSA-g25h-jr74-qp5j', 'CVE-2021-37663'} | 2021-12-09T06:35:04.358938Z | 2021-08-12T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g25h-jr74-qp5j'} | null | {'https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708'} | {'https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708'} |
PyPI | PYSEC-2020-126 | null | In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, by controlling the `fill` argument of tf.strings.as_string, a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a `printf` call is constructed. This may result in segmentation fault. The issue is patched in commit 33be22c65d86256e6826666662e40dbdfe70ee83, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. | {'GHSA-xmq7-7fxm-rr79', 'CVE-2020-15203'} | 2020-10-29T16:15:00Z | 2020-09-25T19:15:00Z | null | null | null | {'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xmq7-7fxm-rr79', 'https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null | {'https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83'} | {'https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83'} |
PyPI | GHSA-xm2v-8rrw-w9pm | Division by 0 in `Conv2DBackpropInput` | ### Impact
An attacker can trigger a division by 0 in `tf.raw_ops.Conv2DBackpropInput`:
```python
import tensorflow as tf
input_tensor = tf.constant([52, 1, 1, 5], shape=[4], dtype=tf.int32)
filter_tensor = tf.constant([], shape=[0, 1, 5, 0], dtype=tf.float32)
out_backprop = tf.constant([], shape=[52, 1, 1, 0], dtype=tf.float32)
tf.raw_ops.Conv2DBackpropInput(input_sizes=input_tensor, filter=filter_tensor,
out_backprop=out_backprop, strides=[1, 1, 1, 1],
use_cudnn_on_gpu=True, padding='SAME',
explicit_paddings=[], data_format='NHWC',
dilations=[1, 1, 1, 1])
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/b40060c9f697b044e3107917c797ba052f4506ab/tensorflow/core/kernels/conv_grad_input_ops.h#L625-L655) does a division by a quantity that is controlled by the caller:
```cc
const size_t size_A = output_image_size * dims.out_depth;
const size_t size_B = filter_total_size * dims.out_depth;
const size_t size_C = output_image_size * filter_total_size;
const size_t work_unit_size = size_A + size_B + size_C;
...
const size_t shard_size =
use_parallel_contraction ? 1 :
(target_working_set_size + work_unit_size - 1) / work_unit_size;
```
### Patches
We have patched the issue in GitHub commit [2be2cdf3a123e231b16f766aa0e27d56b4606535](https://github.com/tensorflow/tensorflow/commit/2be2cdf3a123e231b16f766aa0e27d56b4606535).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29525'} | 2022-03-03T05:14:18.787736Z | 2021-05-21T14:21:51Z | LOW | null | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xm2v-8rrw-w9pm', 'https://github.com/tensorflow/tensorflow/commit/2be2cdf3a123e231b16f766aa0e27d56b4606535', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29525'} | null | {'https://github.com/tensorflow/tensorflow/commit/2be2cdf3a123e231b16f766aa0e27d56b4606535'} | {'https://github.com/tensorflow/tensorflow/commit/2be2cdf3a123e231b16f766aa0e27d56b4606535'} |
PyPI | PYSEC-2021-825 | null | TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for `AllToAll` can be made to execute a division by 0. This occurs whenever the `split_count` argument is 0. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {'CVE-2021-41218', 'GHSA-9crf-c6qr-r273'} | 2021-12-09T06:35:43.909633Z | 2021-11-05T22:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9crf-c6qr-r273', 'https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc'} | null | {'https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc'} | {'https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc'} |
PyPI | GHSA-x5cp-9pcf-pp3h | Denial of Service in Tensorflow | ### Impact
The `RaggedCountSparseOutput` does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the `splits` tensor has the minimum required number of elements. Code uses this quantity to initialize a different data structure:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L241-L244
Since `BatchedMap` is equivalent to a vector, it needs to have at least one element to not be `nullptr`. If user passes a `splits` tensor that is empty or has exactly one element, we get a `SIGABRT` signal raised by the operating system.
### Patches
We have patched the issue in 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and will release a patch release.
We recommend users to upgrade to TensorFlow 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability is a variant of [GHSA-p5f8-gfw5-33w4](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4) | {'CVE-2020-15199'} | 2021-08-26T15:11:57Z | 2020-09-25T18:28:24Z | MODERATE | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15199', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x5cp-9pcf-pp3h', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'} | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'} |
PyPI | GHSA-h98h-8mxr-m8gx | Out-of-bounds read in TensorFlow possibly causing disclosure of the contents of process memory. | TensorFlow before 1.7.0 has an integer overflow that causes an out-of-bounds read, possibly causing disclosure of the contents of process memory. This occurs in the DecodeBmp feature of the BMP decoder in core/kernels/decode_bmp_op.cc. | {'CVE-2018-21233'} | 2022-03-03T05:13:28.032180Z | 2020-05-13T16:01:35Z | MODERATE | null | {'CWE-125'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-21233', 'https://github.com/tensorflow/tensorflow/commit/49f73c55d56edffebde4bca4a407ad69c1cae433', 'https://github.com/tensorflow/tensorflow/', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-001.md'} | null | {'https://github.com/tensorflow/tensorflow/commit/49f73c55d56edffebde4bca4a407ad69c1cae433'} | {'https://github.com/tensorflow/tensorflow/commit/49f73c55d56edffebde4bca4a407ad69c1cae433'} |
PyPI | GHSA-545v-42p7-98fq | Heap out of bounds read in `MaxPoolGradWithArgmax` | ### Impact
The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs:
```python
import tensorflow as tf
input = tf.constant([10.0, 10.0, 10.0], shape=[1, 1, 3, 1], dtype=tf.float32)
grad = tf.constant([10.0, 10.0, 10.0, 10.0], shape=[1, 1, 1, 4], dtype=tf.float32)
argmax = tf.constant([1], shape=[1], dtype=tf.int64)
ksize = [1, 1, 1, 1]
strides = [1, 1, 1, 1]
tf.raw_ops.MaxPoolGradWithArgmax(
input=input, grad=grad, argmax=argmax, ksize=ksize, strides=strides,
padding='SAME', include_batch_in_index=False)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/ef0c008ee84bad91ec6725ddc42091e19a30cf0e/tensorflow/core/kernels/maxpooling_op.cc#L1016-L1017) uses the same value to index in two different arrays but there is no guarantee that the sizes are identical.
### Patches
We have patched the issue in GitHub commit [dcd7867de0fea4b72a2b34bd41eb74548dc23886](https://github.com/tensorflow/tensorflow/commit/dcd7867de0fea4b72a2b34bd41eb74548dc23886).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team. | {'CVE-2021-29570'} | 2022-03-03T05:13:39.721123Z | 2021-05-21T14:25:25Z | LOW | null | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-545v-42p7-98fq', 'https://github.com/tensorflow/tensorflow/commit/dcd7867de0fea4b72a2b34bd41eb74548dc23886', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29570'} | null | {'https://github.com/tensorflow/tensorflow/commit/dcd7867de0fea4b72a2b34bd41eb74548dc23886'} | {'https://github.com/tensorflow/tensorflow/commit/dcd7867de0fea4b72a2b34bd41eb74548dc23886'} |
PyPI | PYSEC-2014-98 | null | Cross-site scripting (XSS) vulnerability in plugins/main/content/js/ajenti.coffee in Eugene Pankov Ajenti 1.2.13 allows remote authenticated users to inject arbitrary web script or HTML via the command field in the Cron functionality. | {'CVE-2014-2260'} | 2021-12-13T06:35:03.047936Z | 2014-04-30T23:58:00Z | null | null | null | {'https://github.com/Eugeny/ajenti/commit/3270fd1d78391bb847b4c9ce37cf921f485b1310', 'https://github.com/Eugeny/ajenti/issues/233', 'http://www.securityfocus.com/bid/64982', 'http://packetstormsecurity.com/files/124804/Ajenti-1.2.13-Cross-Site-Scripting.html', 'http://www.osvdb.org/102174'} | null | {'https://github.com/Eugeny/ajenti/commit/3270fd1d78391bb847b4c9ce37cf921f485b1310'} | {'https://github.com/Eugeny/ajenti/commit/3270fd1d78391bb847b4c9ce37cf921f485b1310'} |
PyPI | PYSEC-2021-599 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the strided slice implementation in TFLite has a logic bug which can allow an attacker to trigger an infinite loop. This arises from newly introduced support for [ellipsis in axis definition](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/strided_slice.cc#L103-L122). An attacker can craft a model such that `ellipsis_end_idx` is smaller than `i` (e.g., always negative). In this case, the inner loop does not increase `i` and the `continue` statement causes execution to skip over the preincrement at the end of the outer loop. We have patched the issue in GitHub commit dfa22b348b70bb89d6d6ec0ff53973bacb4f4695. TensorFlow 2.6.0 is the only affected version. | {'CVE-2021-37686', 'GHSA-mhhc-q96p-mfm9'} | 2021-12-09T06:35:06.351462Z | 2021-08-12T22:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mhhc-q96p-mfm9', 'https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695'} | null | {'https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695'} | {'https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695'} |
PyPI | PYSEC-2017-67 | null | PySAML2 allows remote attackers to conduct XML external entity (XXE) attacks via a crafted SAML XML request or response. | {'CVE-2016-10127'} | 2021-07-25T23:34:51.281897Z | 2017-03-03T15:59:00Z | null | null | null | {'http://www.securityfocus.com/bid/95376', 'https://github.com/rohe/pysaml2/pull/379', 'https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc9b', 'http://www.openwall.com/lists/oss-security/2017/01/19/5', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850716', 'https://github.com/rohe/pysaml2/issues/366'} | null | {'https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc9b'} | {'https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc9b'} |
PyPI | GHSA-4hrh-9vmp-2jgg | Heap buffer overflow in `StringNGrams` | ### Impact
An attacker can cause a heap buffer overflow by passing crafted inputs to `tf.raw_ops.StringNGrams`:
```python
import tensorflow as tf
separator = b'\x02\x00'
ngram_widths = [7, 6, 11]
left_pad = b'\x7f\x7f\x7f\x7f\x7f'
right_pad = b'\x7f\x7f\x25\x5d\x53\x74'
pad_width = 50
preserve_short_sequences = True
l = ['', '', '', '', '', '', '', '', '', '', '']
data = tf.constant(l, shape=[11], dtype=tf.string)
l2 = [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 3]
data_splits = tf.constant(l2, shape=[116], dtype=tf.int64)
out = tf.raw_ops.StringNGrams(data=data,
data_splits=data_splits, separator=separator,
ngram_widths=ngram_widths, left_pad=left_pad,
right_pad=right_pad, pad_width=pad_width,
preserve_short_sequences=preserve_short_sequences)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/1cdd4da14282210cc759e468d9781741ac7d01bf/tensorflow/core/kernels/string_ngrams_op.cc#L171-L185) fails to consider corner cases where input would be split in such a way that the generated tokens should only contain padding elements:
```cc
for (int ngram_index = 0; ngram_index < num_ngrams; ++ngram_index) {
int pad_width = get_pad_width(ngram_width);
int left_padding = std::max(0, pad_width - ngram_index);
int right_padding = std::max(0, pad_width - (num_ngrams - (ngram_index + 1)));
int num_tokens = ngram_width - (left_padding + right_padding);
int data_start_index = left_padding > 0 ? 0 : ngram_index - pad_width;
...
tstring* ngram = &output[ngram_index];
ngram->reserve(ngram_size);
for (int n = 0; n < left_padding; ++n) {
ngram->append(left_pad_);
ngram->append(separator_);
}
for (int n = 0; n < num_tokens - 1; ++n) {
ngram->append(data[data_start_index + n]);
ngram->append(separator_);
}
ngram->append(data[data_start_index + num_tokens - 1]); // <<<
for (int n = 0; n < right_padding; ++n) {
ngram->append(separator_);
ngram->append(right_pad_);
}
...
}
```
If input is such that `num_tokens` is 0, then, for `data_start_index=0` (when left padding is present), the marked line would result in reading `data[-1]`.
### Patches
We have patched the issue in GitHub commit [ba424dd8f16f7110eea526a8086f1a155f14f22b](https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29542'} | 2022-04-26T18:17:07.368107Z | 2021-05-21T14:23:15Z | LOW | null | {'CWE-787', 'CWE-131'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29542', 'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hrh-9vmp-2jgg'} | null | {'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b'} | {'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b'} |
PyPI | GHSA-452g-f7fp-9jf7 | Type confusion during tensor casts lead to dereferencing null pointers | ### Impact
Calling TF operations with tensors of non-numeric types when the operations expect numeric tensors result in null pointer dereferences.
There are multiple ways to reproduce this, listing a few examples here:
```python
import tensorflow as tf
import numpy as np
data = tf.random.truncated_normal(shape=1,mean=np.float32(20.8739),stddev=779.973,dtype=20,seed=64)
```
```python
import tensorflow as tf
import numpy as np
data =
tf.random.stateless_truncated_normal(shape=1,seed=[63,70],mean=np.float32(20.8739),stddev=779.973,dtype=20)
```
```python
import tensorflow as tf
import numpy as np
data = tf.one_hot(indices=[62,50],depth=136,on_value=np.int32(237),off_value=158,axis=856,dtype=20)
```
```python
import tensorflow as tf
import numpy as np
data = tf.range(start=np.int32(214),limit=660,delta=129,dtype=20)
```
```python
import tensorflow as tf
import numpy as np
data = tf.raw_ops.ResourceCountUpTo(resource=np.int32(30), limit=872, T=3)
```
```python
import tensorflow as tf
import numpy as np
writer_array = np.array([1,2],dtype=np.int32)
writer_tensor = tf.convert_to_tensor(writer_array,dtype=tf.resource)
```
All these examples and similar ones have the same behavior: the [conversion from Python array to C++ array](https://github.com/tensorflow/tensorflow/blob/ff70c47a396ef1e3cb73c90513da4f5cb71bebba/tensorflow/python/lib/core/ndarray_tensor.cc#L113-L169) is vulnerable to a type confusion:
```cc
int pyarray_type = PyArray_TYPE(array);
PyArray_Descr* descr = PyArray_DESCR(array);
switch (pyarray_type) {
...
case NPY_VOID:
// Quantized types are currently represented as custom struct types.
// PyArray_TYPE returns NPY_VOID for structs, and we should look into
// descr to derive the actual type.
// Direct feeds of certain types of ResourceHandles are represented as a
// custom struct type.
return PyArrayDescr_to_TF_DataType(descr, out_tf_datatype);
...
}
```
For the tensor types involved in the above example, the `pyarray_type` is `NPY_VOID` but the `descr` field is such that `descr->field = NULL`. Then [`PyArrayDescr_to_TF_DataType`](https://github.com/tensorflow/tensorflow/blob/ff70c47a396ef1e3cb73c90513da4f5cb71bebba/tensorflow/python/lib/core/ndarray_tensor.cc#L72-L77) will trigger a null dereference:
```cc
Status PyArrayDescr_to_TF_DataType(PyArray_Descr* descr,
TF_DataType* out_tf_datatype) {
PyObject* key;
PyObject* value;
Py_ssize_t pos = 0;
if (PyDict_Next(descr->fields, &pos, &key, &value)) {
...
}
}
```
This is because the Python's `PyDict_Next` implementation would dereference the first argument.
### Patches
We have patched the issue in GitHub commit [030af767d357d1b4088c4a25c72cb3906abac489](https://github.com/tensorflow/tensorflow/commit/030af767d357d1b4088c4a25c72cb3906abac489).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360 as well as Ye Zhang and Yakun Zhang of Baidu X-Team. | {'CVE-2021-29513'} | 2022-03-03T05:12:35.841801Z | 2021-05-21T14:20:46Z | LOW | null | {'CWE-476'} | {'https://github.com/tensorflow/tensorflow/commit/030af767d357d1b4088c4a25c72cb3906abac489', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-452g-f7fp-9jf7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29513'} | null | {'https://github.com/tensorflow/tensorflow/commit/030af767d357d1b4088c4a25c72cb3906abac489'} | {'https://github.com/tensorflow/tensorflow/commit/030af767d357d1b4088c4a25c72cb3906abac489'} |
PyPI | GHSA-h9px-9vqg-222h | Heap OOB in `QuantizeAndDequantizeV3` | ### Impact
An attacker can read data outside of bounds of heap allocated buffer in `tf.raw_ops.QuantizeAndDequantizeV3`:
```python
import tensorflow as tf
tf.raw_ops.QuantizeAndDequantizeV3(
input=[2.5,2.5], input_min=[0,0], input_max=[1,1], num_bits=[30],
signed_input=False, range_given=False, narrow_range=False, axis=3)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/11ff7f80667e6490d7b5174aa6bf5e01886e770f/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L237) does not validate the value of user supplied `axis` attribute before using it to index in the array backing the `input` argument:
```cc
const int depth = (axis_ == -1) ? 1 : input.dim_size(axis_);
```
### Patches
We have patched the issue in GitHub commit [99085e8ff02c3763a0ec2263e44daec416f6a387](https://github.com/tensorflow/tensorflow/commit/99085e8ff02c3763a0ec2263e44daec416f6a387).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Aivul Team from Qihoo 360. | {'CVE-2021-29553'} | 2022-03-03T05:13:50.806338Z | 2021-05-21T14:23:51Z | LOW | null | {'CWE-125'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29553', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h9px-9vqg-222h', 'https://github.com/tensorflow/tensorflow/commit/99085e8ff02c3763a0ec2263e44daec416f6a387'} | null | {'https://github.com/tensorflow/tensorflow/commit/99085e8ff02c3763a0ec2263e44daec416f6a387'} | {'https://github.com/tensorflow/tensorflow/commit/99085e8ff02c3763a0ec2263e44daec416f6a387'} |
PyPI | PYSEC-2021-833 | null | TensorFlow is an open source platform for machine learning. In affected versions the implementation of `SparseBinCount` is vulnerable to a heap OOB access. This is because of missing validation between the elements of the `values` argument and the shape of the sparse output. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {'CVE-2021-41226', 'GHSA-374m-jm66-3vj8'} | 2021-12-09T06:35:45.112404Z | 2021-11-05T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-374m-jm66-3vj8'} | null | {'https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba'} | {'https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba'} |
PyPI | PYSEC-2020-130 | null | In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, to mimic Python's indexing with negative values, TFLite uses `ResolveAxis` to convert negative values to positive indices. However, the only check that the converted index is now valid is only present in debug builds. If the `DCHECK` does not trigger, then code execution moves ahead with a negative index. This, in turn, results in accessing data out of bounds which results in segfaults and/or data corruption. The issue is patched in commit 2d88f470dea2671b430884260f3626b1fe99830a, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. | {'CVE-2020-15207', 'GHSA-q4qf-3fc6-8x34'} | 2020-10-29T16:15:00Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q4qf-3fc6-8x34', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null | {'https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a'} | {'https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a'} |
PyPI | PYSEC-2021-130 | null | JupyterLab is a user interface for Project Jupyter which will eventually replace the classic Jupyter Notebook. In affected versions untrusted notebook can execute code on load. In particular JupyterLab doesn’t sanitize the action attribute of html `<form>`. Using this it is possible to trigger the form validation outside of the form itself. This is a remote code execution, but requires user action to open a notebook. | {'CVE-2021-32797', 'GHSA-4952-p58q-6crx'} | 2021-08-27T03:22:05.377903Z | 2021-08-09T21:15:00Z | null | null | null | {'https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-4952-p58q-6crx', 'https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed'} | null | {'https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed'} | {'https://github.com/jupyterlab/jupyterlab/commit/504825938c0abfa2fb8ff8d529308830a5ae42ed'} |
PyPI | GHSA-vw27-fwjf-5qxm | Arbitrary command execution on Windows via qutebrowserurl: URL handler | ### Impact
Starting with qutebrowser v1.7.0, the Windows installer for qutebrowser registers it as a handler for certain URL schemes. With some applications such as Outlook Desktop, opening a specially crafted URL can lead to argument injection, allowing execution of qutebrowser commands, which in turn allows arbitrary code execution via commands such as `:spawn` or `:debug-pyeval`.
Only Windows installs where qutebrowser is registered as URL handler are affected. It does *not* have to be set as default browser for the exploit to work.
### Patches
The issue has been fixed in [qutebrowser v2.4.0](https://github.com/qutebrowser/qutebrowser/releases/tag/v2.4.0) in commit 8f46ba3f6dc7b18375f7aa63c48a1fe461190430.
The fix also adds additional hardening for potential similar issues on Linux (by adding the new `--untrusted-args` flag to the `.desktop` file), though no such vulnerabilities are known.
Backported patches for older versions are available, but no further releases are planned:
- v1.7.x: d1ceaab
- v1.8.x: ca7155d
- v1.9.x: 157d871
- v1.10.x: 94a6125
- v1.11.x: 10acfbb
- v1.12.x: 363a18f
- v1.13.x: 410f262
- v1.14.x: e4f4d93
- v2.0.x: 15a1654
- v2.1.x: 509ddf2
- v2.2.x: 03dcba5
- v2.3.x: 00a694c
(commits are referring to qutebrowser/qutebrowser on GitHub)
### Workarounds
Remove qutebrowser from the default browser settings entirely, so that it does not handle any kind of URLs. Make sure to remove *all* handlers, including an (accidental) `qutebrowserURL` handler, e.g. using [NirSoft URLProtocolView](https://www.nirsoft.net/utils/url_protocol_view.html).
### Timeline
2021-10-15: Issue reported via security@qutebrowser.org by Ping Fan (Zetta) Ke of [Valkyrie-X Security Research Group (VXRL)](https://www.vxrl.hk/)
2021-10-15: Issue confirmed by @The-Compiler (lead developer), author of installer (@bitraid) contacted for help/review
2021-10-15: CVE assigned by GitHub
2021-10-15 to 2021-10-17: Fix developed
2021-10-17: Additional core developer (@toofar) contacted for help/review
2021-10-21: v2.4.0 released containing the fix
2021-10-21: Advisory and fix published
### References
See the [commit message](https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430) for additional information and references to various similar issues in other projects.
### Acknowledgements
Thanks to Ping Fan (Zetta) Ke of [Valkyrie-X Security Research Group](https://www.vxrl.hk/) (VXRL/@vxresearch) for finding and responsibly disclosing this issue.
### Contact
If you have any questions or comments about this advisory, please email [security@qutebrowser.org](mailto:security@qutebrowser.org). | {'CVE-2021-41146'} | 2022-03-03T05:13:43.293872Z | 2021-10-22T16:20:10Z | HIGH | null | {'CWE-77', 'CWE-641', 'CWE-88'} | {'https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41146', 'https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-vw27-fwjf-5qxm', 'https://github.com/qutebrowser/qutebrowser'} | null | {'https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430'} | {'https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430'} |
PyPI | GHSA-c968-pq7h-7fxv | Division by 0 in `Conv3DBackprop*` | ### Impact
The `tf.raw_ops.Conv3DBackprop*` operations fail to validate that the input tensors are not empty. In turn, this would result in a division by 0:
```python
import tensorflow as tf
input_sizes = tf.constant([0, 0, 0, 0, 0], shape=[5], dtype=tf.int32)
filter_tensor = tf.constant([], shape=[0, 0, 0, 1, 0], dtype=tf.float32)
out_backprop = tf.constant([], shape=[0, 0, 0, 0, 0], dtype=tf.float32)
tf.raw_ops.Conv3DBackpropInputV2(input_sizes=input_sizes, filter=filter_tensor, out_backprop=out_backprop, strides=[1, 1, 1, 1, 1], padding='SAME', data_format='NDHWC', dilations=[1, 1, 1, 1, 1])
```
```python
import tensorflow as tf
input_sizes = tf.constant([1], shape=[1, 1, 1, 1, 1], dtype=tf.float32)
filter_tensor = tf.constant([0, 0, 0, 1, 0], shape=[5], dtype=tf.int32)
out_backprop = tf.constant([], shape=[1, 1, 1, 1, 0], dtype=tf.float32)
tf.raw_ops.Conv3DBackpropFilterV2(input=input_sizes, filter_sizes=filter_tensor, out_backprop=out_backprop, strides=[1, 1, 1, 1, 1], padding='SAME', data_format='NDHWC', dilations=[1, 1, 1, 1, 1])
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/a91bb59769f19146d5a0c20060244378e878f140/tensorflow/core/kernels/conv_grad_ops_3d.cc#L430-L450) does not check that the divisor used in computing the shard size is not zero:
```cc
const int64 size_A = output_image_size * dims.out_depth;
const int64 size_B = filter_total_size * dims.out_depth;
const int64 size_C = output_image_size * filter_total_size;
const int64 work_unit_size = size_A + size_B + size_C;
...
const size_t shard_size =
use_parallel_contraction
? 1
: (target_working_set_size + work_unit_size - 1) / work_unit_size;
```
Thus, if attacker controls the input sizes, they can trigger a denial of service via a division by zero error.
### Patches
We have patched the issue in GitHub commit [311403edbc9816df80274bd1ea8b3c0c0f22c3fa](https://github.com/tensorflow/tensorflow/commit/311403edbc9816df80274bd1ea8b3c0c0f22c3fa).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29522'} | 2022-03-03T05:13:17.830516Z | 2021-05-21T14:21:39Z | LOW | null | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/commit/311403edbc9816df80274bd1ea8b3c0c0f22c3fa', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29522', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c968-pq7h-7fxv'} | null | {'https://github.com/tensorflow/tensorflow/commit/311403edbc9816df80274bd1ea8b3c0c0f22c3fa'} | {'https://github.com/tensorflow/tensorflow/commit/311403edbc9816df80274bd1ea8b3c0c0f22c3fa'} |
PyPI | PYSEC-2021-560 | null | TensorFlow is an end-to-end open source platform for machine learning. When a user does not supply arguments that determine a valid sparse tensor, `tf.raw_ops.SparseTensorSliceDataset` implementation can be made to dereference a null pointer. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/data/sparse_tensor_slice_dataset_op.cc#L240-L251) has some argument validation but fails to consider the case when either `indices` or `values` are provided for an empty sparse tensor when the other is not. If `indices` is empty, then [code that performs validation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/data/sparse_tensor_slice_dataset_op.cc#L260-L261) (i.e., checking that the indices are monotonically increasing) results in a null pointer dereference. If `indices` as provided by the user is empty, then `indices` in the C++ code above is backed by an empty `std::vector`, hence calling `indices->dim_size(0)` results in null pointer dereferencing (same as calling `std::vector::at()` on an empty vector). We have patched the issue in GitHub commit 02cc160e29d20631de3859c6653184e3f876b9d7. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'GHSA-c5x2-p679-95wc', 'CVE-2021-37647'} | 2021-12-09T06:35:03.005830Z | 2021-08-12T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c5x2-p679-95wc', 'https://github.com/tensorflow/tensorflow/commit/02cc160e29d20631de3859c6653184e3f876b9d7'} | null | {'https://github.com/tensorflow/tensorflow/commit/02cc160e29d20631de3859c6653184e3f876b9d7'} | {'https://github.com/tensorflow/tensorflow/commit/02cc160e29d20631de3859c6653184e3f876b9d7'} |
PyPI | PYSEC-2022-139 | null | Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCostEstimator::CalculateTensorSize` is vulnerable to an integer overflow if an attacker can create an operation which would involve a tensor with large enough number of elements. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | {'CVE-2022-23575', 'GHSA-c94w-c95p-phf8'} | 2022-03-09T00:18:27.680857Z | 2022-02-04T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/fcd18ce3101f245b083b30655c27b239dc72221e', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c94w-c95p-phf8', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1552-L1558'} | null | {'https://github.com/tensorflow/tensorflow/commit/fcd18ce3101f245b083b30655c27b239dc72221e'} | {'https://github.com/tensorflow/tensorflow/commit/fcd18ce3101f245b083b30655c27b239dc72221e'} |
PyPI | PYSEC-2021-425 | null | Matrix is an ecosystem for open federated Instant Messaging and Voice over IP. In versions 1.41.0 and prior, unauthorised users can access the membership (list of members, with their display names) of a room if they know the ID of the room. The vulnerability is limited to rooms with `shared` history visibility. Furthermore, the unauthorised user must be using an account on a vulnerable homeserver that is in the room. Server administrators should upgrade to 1.41.1 or later in order to receive the patch. One workaround is available. Administrators of servers that use a reverse proxy could, with potentially unacceptable loss of functionality, block the endpoints: `/_matrix/client/r0/rooms/{room_id}/members` with `at` query parameter, and `/_matrix/client/unstable/rooms/{room_id}/members` with `at` query parameter. | {'CVE-2021-39164', 'GHSA-3x4c-pq33-4w3q'} | 2021-11-16T03:58:44.571857Z | 2021-08-31T17:15:00Z | null | null | null | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXT7ID7DNBRN2TVTETU3SYQHJKEG6PXN/', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-3x4c-pq33-4w3q', 'https://github.com/matrix-org/synapse/releases/tag/v1.41.1', 'https://github.com/matrix-org/synapse/commit/cb35df940a', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2VHDEPCZ22GJFMZCWA2XZAGPOEV72POF/'} | null | {'https://github.com/matrix-org/synapse/commit/cb35df940a'} | {'https://github.com/matrix-org/synapse/commit/cb35df940a'} |
PyPI | PYSEC-2022-16 | null | Jupyter Server Proxy is a Jupyter notebook server extension to proxy web services. Versions of Jupyter Server Proxy prior to 3.2.1 are vulnerable to Server-Side Request Forgery (SSRF). Any user deploying Jupyter Server or Notebook with jupyter-proxy-server extension enabled is affected. A lack of input validation allows authenticated clients to proxy requests to other hosts, bypassing the `allowed_hosts` check. Because authentication is required, which already grants permissions to make the same requests via kernel or terminal execution, this is considered low to moderate severity. Users may upgrade to version 3.2.1 to receive a patch or, as a workaround, install the patch manually. | {'CVE-2022-21697', 'GHSA-gcv9-6737-pjqw'} | 2022-02-01T17:37:55.179786Z | 2022-01-25T14:15:00Z | null | null | null | {'https://github.com/jupyterhub/jupyter-server-proxy/security/advisories/GHSA-gcv9-6737-pjqw', 'https://github.com/jupyterhub/jupyter-server-proxy/commit/fd31930bacd12188c448c886e0783529436b99eb', 'https://github.com/jupyterhub/jupyter-server-proxy/compare/v3.2.0...v3.2.1.patch'} | null | {'https://github.com/jupyterhub/jupyter-server-proxy/commit/fd31930bacd12188c448c886e0783529436b99eb'} | {'https://github.com/jupyterhub/jupyter-server-proxy/commit/fd31930bacd12188c448c886e0783529436b99eb'} |
PyPI | GHSA-xqfj-cr6q-pc8w | Crash in `tf.transpose` with complex inputs | ### Impact
Passing a complex argument to `tf.transpose` at the same time as passing `conjugate=True` argument results in a crash:
```python
import tensorflow as tf
tf.transpose(conjugate=True, a=complex(1))
```
### Patches
We have received a patch for the issue in GitHub commit [1dc6a7ce6e0b3e27a7ae650bfc05b195ca793f88](https://github.com/tensorflow/tensorflow/commit/1dc6a7ce6e0b3e27a7ae650bfc05b195ca793f88).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported in [#42105](https://github.com/tensorflow/issues/42105) and fixed in [#46973](https://github.com/tensorflow/issues/46973). | {'CVE-2021-29618'} | 2022-03-03T05:12:38.691679Z | 2021-05-21T14:28:58Z | LOW | null | {'CWE-755'} | {'https://github.com/tensorflow/issues/46973', 'https://github.com/tensorflow/tensorflow/commit/1dc6a7ce6e0b3e27a7ae650bfc05b195ca793f88', 'https://github.com/tensorflow/issues/42105', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xqfj-cr6q-pc8w', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29618'} | null | {'https://github.com/tensorflow/tensorflow/commit/1dc6a7ce6e0b3e27a7ae650bfc05b195ca793f88'} | {'https://github.com/tensorflow/tensorflow/commit/1dc6a7ce6e0b3e27a7ae650bfc05b195ca793f88'} |
PyPI | PYSEC-2017-71 | null | win_useradd, salt-cloud and the Linode driver in salt 2015.5.x before 2015.5.6, and 2015.8.x before 2015.8.1 leak password information in debug logs. | {'CVE-2015-6941'} | 2021-07-25T23:34:53.862989Z | 2017-08-09T16:29:00Z | null | null | null | {'https://docs.saltstack.com/en/latest/topics/releases/2015.5.6.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1273066', 'https://docs.saltstack.com/en/latest/topics/releases/2015.8.1.html', 'https://github.com/twangboy/salt/commit/c0689e32154c41f59840ae10ffc5fbfa30618710'} | null | {'https://github.com/twangboy/salt/commit/c0689e32154c41f59840ae10ffc5fbfa30618710'} | {'https://github.com/twangboy/salt/commit/c0689e32154c41f59840ae10ffc5fbfa30618710'} |
PyPI | GHSA-cpqf-3c3r-c9g2 | Cobbler before 3.3.0 allows log poisoning | Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection. | {'CVE-2021-40323'} | 2022-03-03T05:14:04.246526Z | 2021-10-05T17:53:20Z | HIGH | null | {'CWE-94'} | {'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40323', 'https://github.com/cobbler/cobbler', 'https://github.com/cobbler/cobbler/releases/tag/v3.3.0'} | null | {'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a'} | {'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a'} |
PyPI | PYSEC-2020-219 | null | In wagtail-2fa before 1.4.1, any user with access to the CMS can view and delete other users 2FA devices by going to the correct path. The user does not require special permissions in order to do so. By deleting the other users device they can disable the target users 2FA devices and potentially compromise the account if they figure out their password. The problem has been patched in version 1.4.1. | {'GHSA-9gjv-6qq6-v7qm', 'CVE-2020-5240'} | 2021-08-25T04:30:36.375287Z | 2020-03-13T22:15:00Z | null | null | null | {'https://github.com/labd/wagtail-2fa/commit/ac23550d33b7436e90e3beea904647907eba5b74', 'https://github.com/labd/wagtail-2fa/security/advisories/GHSA-9gjv-6qq6-v7qm'} | null | {'https://github.com/labd/wagtail-2fa/commit/ac23550d33b7436e90e3beea904647907eba5b74'} | {'https://github.com/labd/wagtail-2fa/commit/ac23550d33b7436e90e3beea904647907eba5b74'} |
PyPI | PYSEC-2021-649 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.AddManySparseToTensorsMap`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/kernels/sparse_tensors_map_ops.cc#L257) takes the values specified in `sparse_shape` as dimensions for the output shape. The `TensorShape` constructor(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L183-L188) uses a `CHECK` operation which triggers when `InitDims`(https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L212-L296) returns a non-OK status. This is a legacy implementation of the constructor and operations should use `BuildTensorShapeBase` or `AddDimWithStatus` to prevent `CHECK`-failures in the presence of overflows. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-2cpx-427x-q2c6', 'CVE-2021-29523'} | 2021-12-09T06:35:18.759879Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2cpx-427x-q2c6'} | null | {'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c'} | {'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c'} |
PyPI | PYSEC-2021-219 | null | TensorFlow is an end-to-end open source platform for machine learning. Due to lack of validation in `tf.raw_ops.Dequantize`, an attacker can trigger a read from outside of bounds of heap allocated data. The implementation(https://github.com/tensorflow/tensorflow/blob/26003593aa94b1742f34dc22ce88a1e17776a67d/tensorflow/core/kernels/dequantize_op.cc#L106-L131) accesses the `min_range` and `max_range` tensors in parallel but fails to check that they have the same shape. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-c45w-2wxr-pp53', 'CVE-2021-29582'} | 2021-08-27T03:22:35.924594Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/5899741d0421391ca878da47907b1452f06aaf1b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c45w-2wxr-pp53'} | null | {'https://github.com/tensorflow/tensorflow/commit/5899741d0421391ca878da47907b1452f06aaf1b'} | {'https://github.com/tensorflow/tensorflow/commit/5899741d0421391ca878da47907b1452f06aaf1b'} |
PyPI | GHSA-gv26-jpj9-c8gq | Incomplete validation in `SparseSparseMinimum` | ### Impact
Incomplete validation in `SparseAdd` results in allowing attackers to exploit undefined behavior (dereferencing null pointers) as well as write outside of bounds of heap allocated data:
```python
import tensorflow as tf
a_indices = tf.ones([45, 92], dtype=tf.int64)
a_values = tf.ones([45], dtype=tf.int64)
a_shape = tf.ones([1], dtype=tf.int64)
b_indices = tf.ones([1, 1], dtype=tf.int64)
b_values = tf.ones([1], dtype=tf.int64)
b_shape = tf.ones([1], dtype=tf.int64)
tf.raw_ops.SparseSparseMinimum(a_indices=a_indices,
a_values=a_values,
a_shape=a_shape,
b_indices=b_indices,
b_values=b_values,
b_shape=b_shape)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/656e7673b14acd7835dc778867f84916c6d1cac2/tensorflow/core/kernels/sparse_sparse_binary_op_shared.cc) has a large set of validation for the two sparse tensor inputs (6 tensors in total), but does not validate that the tensors are not empty or that the second dimension of `*_indices` matches the size of corresponding `*_shape`. This allows attackers to send tensor triples that represent invalid sparse tensors to abuse code assumptions that are not protected by validation.
### Patches
We have patched the issue in GitHub commit [ba6822bd7b7324ba201a28b2f278c29a98edbef2](https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2) followed by GitHub commit [f6fde895ef9c77d848061c0517f19d0ec2682f3a](https://github.com/tensorflow/tensorflow/commit/f6fde895ef9c77d848061c0517f19d0ec2682f3a).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team. | {'CVE-2021-29607'} | 2022-03-18T18:03:17.505392Z | 2022-03-18T17:52:25Z | MODERATE | null | {'CWE-754'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29607', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gv26-jpj9-c8gq', 'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2', 'https://github.com/tensorflow/tensorflow/commit/f6fde895ef9c77d848061c0517f19d0ec2682f3a'} | null | {'https://github.com/tensorflow/tensorflow/commit/f6fde895ef9c77d848061c0517f19d0ec2682f3a', 'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2'} | {'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2', 'https://github.com/tensorflow/tensorflow/commit/f6fde895ef9c77d848061c0517f19d0ec2682f3a'} |
PyPI | PYSEC-2021-537 | null | TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in `SparseAdd` results in allowing attackers to exploit undefined behavior (dereferencing null pointers) as well as write outside of bounds of heap allocated data. The implementation(https://github.com/tensorflow/tensorflow/blob/656e7673b14acd7835dc778867f84916c6d1cac2/tensorflow/core/kernels/sparse_add_op.cc) has a large set of validation for the two sparse tensor inputs (6 tensors in total), but does not validate that the tensors are not empty or that the second dimension of `*_indices` matches the size of corresponding `*_shape`. This allows attackers to send tensor triples that represent invalid sparse tensors to abuse code assumptions that are not protected by validation. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-cjc7-49v2-jp64', 'CVE-2021-29609'} | 2021-12-09T06:35:00.330206Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc', 'https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cjc7-49v2-jp64'} | null | {'https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc', 'https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3'} | {'https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc', 'https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3'} |
PyPI | PYSEC-2021-167 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a null pointer dereference by providing an invalid `permutation` to `tf.raw_ops.SparseMatrixSparseCholesky`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/080f1d9e257589f78b3ffb75debf584168aa6062/tensorflow/core/kernels/sparse/sparse_cholesky_op.cc#L85-L86) fails to properly validate the input arguments. Although `ValidateInputs` is called and there are checks in the body of this function, the code proceeds to the next line in `ValidateInputs` since `OP_REQUIRES`(https://github.com/tensorflow/tensorflow/blob/080f1d9e257589f78b3ffb75debf584168aa6062/tensorflow/core/framework/op_requires.h#L41-L48) is a macro that only exits the current function. Thus, the first validation condition that fails in `ValidateInputs` will cause an early return from that function. However, the caller will continue execution from the next line. The fix is to either explicitly check `context->status()` or to convert `ValidateInputs` to return a `Status`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-xcwj-wfcm-m23c', 'CVE-2021-29530'} | 2021-08-27T03:22:26.683297Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xcwj-wfcm-m23c', 'https://github.com/tensorflow/tensorflow/commit/e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd'} | null | {'https://github.com/tensorflow/tensorflow/commit/e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd'} | {'https://github.com/tensorflow/tensorflow/commit/e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd'} |
PyPI | PYSEC-2021-472 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.QuantizeAndDequantizeV4Grad`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/95078c145b5a7a43ee046144005f733092756ab5/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L162-L163) does not validate the rank of the `input_*` tensors. In turn, this results in the tensors being passes as they are to `QuantizeAndDequantizePerChannelGradientImpl`(https://github.com/tensorflow/tensorflow/blob/95078c145b5a7a43ee046144005f733092756ab5/tensorflow/core/kernels/quantize_and_dequantize_op.h#L295-L306). However, the `vec<T>` method, requires the rank to 1 and triggers a `CHECK` failure otherwise. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 as this is the only other affected version. | {'CVE-2021-29544', 'GHSA-6g85-3hm8-83f9'} | 2021-12-09T06:34:50.195889Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6g85-3hm8-83f9', 'https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b'} | null | {'https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b'} | {'https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b'} |
PyPI | PYSEC-2021-188 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `MatrixTriangularSolve`(https://github.com/tensorflow/tensorflow/blob/8cae746d8449c7dda5298327353d68613f16e798/tensorflow/core/kernels/linalg/matrix_triangular_solve_op_impl.h#L160-L240) fails to terminate kernel execution if one validation condition fails. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'CVE-2021-29551', 'GHSA-vqw6-72r7-fgw7'} | 2021-08-27T03:22:30.499582Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/480641e3599775a8895254ffbc0fc45621334f68', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vqw6-72r7-fgw7'} | null | {'https://github.com/tensorflow/tensorflow/commit/480641e3599775a8895254ffbc0fc45621334f68'} | {'https://github.com/tensorflow/tensorflow/commit/480641e3599775a8895254ffbc0fc45621334f68'} |
PyPI | GHSA-p43w-g3c5-g5mq | Out of bounds read in Pillow | An issue was discovered in Pillow before 8.1.1. There is an out-of-bounds read in SGIRleDecode.c. | {'CVE-2021-25293'} | 2022-03-03T05:13:17.214711Z | 2021-03-29T16:35:27Z | HIGH | null | {'CWE-125'} | {'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25293', 'https://security.gentoo.org/glsa/202107-33', 'https://github.com/python-pillow/Pillow/commit/4853e522bddbec66022c0915b9a56255d0188bf9', 'https://github.com/python-pillow/Pillow'} | null | {'https://github.com/python-pillow/Pillow/commit/4853e522bddbec66022c0915b9a56255d0188bf9'} | {'https://github.com/python-pillow/Pillow/commit/4853e522bddbec66022c0915b9a56255d0188bf9'} |
PyPI | GHSA-cmc7-mfmr-xqrx | Logic error in authentication in proxy.py | before_upstream_connection in AuthPlugin in http/proxy/auth.py in proxy.py before 2.3.1 accepts incorrect Proxy-Authorization header data because of a boolean confusion (and versus or). | {'CVE-2021-3116'} | 2022-03-03T05:14:17.833004Z | 2021-04-07T21:01:25Z | HIGH | null | {'CWE-480', 'CWE-287'} | {'https://pypi.org/project/proxy.py/2.3.1/#history', 'https://cardaci.xyz/advisories/2021/01/10/proxy.py-2.3.0-broken-basic-authentication/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3116', 'https://github.com/abhinavsingh/proxy.py/pull/482/commits/9b00093288237f5073c403f2c4f62acfdfa8ed46'} | null | {'https://github.com/abhinavsingh/proxy.py/pull/482/commits/9b00093288237f5073c403f2c4f62acfdfa8ed46'} | {'https://github.com/abhinavsingh/proxy.py/pull/482/commits/9b00093288237f5073c403f2c4f62acfdfa8ed46'} |
PyPI | OSV-2021-955 | Stack-buffer-overflow in Buffer_AppendIndentUnchecked | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009
```
Crash type: Stack-buffer-overflow WRITE 1
Crash state:
Buffer_AppendIndentUnchecked
encode
encode
```
| null | 2022-04-13T03:26:07.069166Z | 2021-07-11T00:01:05.153778Z | HIGH | null | null | {'https://github.com/ultrajson/ultrajson/commit/5525f8c9ef8bb879dadd0eb942d524827d1b0362', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009'} | {'https://github.com/ultrajson/ultrajson/commit/a920bfa9d85bcd78836b866d1be80c1e3dcca1da'} | {'https://github.com/ultrajson/ultrajson/commit/5525f8c9ef8bb879dadd0eb942d524827d1b0362'} | {'https://github.com/ultrajson/ultrajson/commit/5525f8c9ef8bb879dadd0eb942d524827d1b0362'} |
PyPI | GHSA-q8qj-fc9q-cphr | Undefined behavior in Tensorflow | ### Impact
If a user passes an invalid argument to `dlpack.to_dlpack` the expected validations will cause variables to bind to `nullptr` while setting a `status` variable to the error condition.
However, this `status` argument is not properly checked:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L265-L267
Hence, code following these methods will bind references to null pointers:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L279-L285
This is undefined behavior and reported as an error if compiling with `-fsanitize=null`.
### Patches
We have patched the issue in 22e07fb204386768e5bcbea563641ea11f96ceb8 and will release a patch release for all affected versions.
We recommend users to upgrade to TensorFlow 2.2.1 or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been discovered during variant analysis of [GHSA-rjjg-hgv6-h69v](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rjjg-hgv6-h69v). | {'CVE-2020-15191'} | 2021-08-26T15:10:50Z | 2020-09-25T18:28:25Z | MODERATE | null | {'CWE-20', 'CWE-252', 'CWE-476'} | {'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q8qj-fc9q-cphr', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15191', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'} | null | {'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8'} | {'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.