Filtered by vendor Google
Subscriptions
Total
12759 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-42762 | 2 Google, Unisoc | 14 Android, S8007, Sc7731e and 11 more | 2025-04-23 | 5.5 Medium |
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | ||||
CVE-2022-42761 | 2 Google, Unisoc | 14 Android, S8000, Sc7731e and 11 more | 2025-04-23 | 5.5 Medium |
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | ||||
CVE-2022-42760 | 2 Google, Unisoc | 14 Android, S8018, Sc7731e and 11 more | 2025-04-23 | 5.5 Medium |
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | ||||
CVE-2022-42759 | 2 Google, Unisoc | 14 Android, S8017, Sc7731e and 11 more | 2025-04-23 | 5.5 Medium |
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | ||||
CVE-2022-42758 | 2 Google, Unisoc | 14 Android, S8016, Sc7731e and 11 more | 2025-04-23 | 3.3 Low |
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | ||||
CVE-2022-42757 | 2 Google, Unisoc | 14 Android, S8015, Sc7731e and 11 more | 2025-04-23 | 3.3 Low |
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | ||||
CVE-2022-42755 | 2 Google, Unisoc | 14 Android, S8023, Sc7731e and 11 more | 2025-04-23 | 5.5 Medium |
In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | ||||
CVE-2022-23591 | 1 Google | 1 Tensorflow | 2025-04-23 | 7.5 High |
Tensorflow is an Open Source Machine Learning Framework. The `GraphDef` format in TensorFlow does not allow self recursive functions. The runtime assumes that this invariant is satisfied. However, a `GraphDef` containing a fragment such as the following can be consumed when loading a `SavedModel`. This would result in a stack overflow during execution as resolving each `NodeDef` means resolving the function itself and its nodes. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | ||||
CVE-2022-23594 | 1 Google | 1 Tensorflow | 2025-04-23 | 8.8 High |
Tensorflow is an Open Source Machine Learning Framework. The TFG dialect of TensorFlow (MLIR) makes several assumptions about the incoming `GraphDef` before converting it to the MLIR-based dialect. If an attacker changes the `SavedModel` format on disk to invalidate these assumptions and the `GraphDef` is then converted to MLIR-based IR then they can cause a crash in the Python interpreter. Under certain scenarios, heap OOB read/writes are possible. These issues have been discovered via fuzzing and it is possible that more weaknesses exist. We will patch them as they are discovered. | ||||
CVE-2022-23571 | 1 Google | 1 Tensorflow | 2025-04-23 | 6.5 Medium |
Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments, if the tensors have an invalid `dtype` and 0 elements or an invalid shape. This allows attackers to cause denial of services in TensorFlow processes. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | ||||
CVE-2022-23563 | 1 Google | 1 Tensorflow | 2025-04-23 | 7.1 High |
Tensorflow is an Open Source Machine Learning Framework. In multiple places, TensorFlow uses `tempfile.mktemp` to create temporary files. While this is acceptable in testing, in utilities and libraries it is dangerous as a different process can create the file between the check for the filename in `mktemp` and the actual creation of the file by a subsequent operation (a TOC/TOU type of weakness). In several instances, TensorFlow was supposed to actually create a temporary directory instead of a file. This logic bug is hidden away by the `mktemp` function usage. We have patched the issue in several commits, replacing `mktemp` with the safer `mkstemp`/`mkdtemp` functions, according to the usage pattern. Users are advised to upgrade as soon as possible. | ||||
CVE-2022-23562 | 1 Google | 1 Tensorflow | 2025-04-23 | 7.6 High |
Tensorflow is an Open Source Machine Learning Framework. The implementation of `Range` suffers from integer overflows. These can trigger undefined behavior or, in some scenarios, extremely large allocations. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | ||||
CVE-2022-23565 | 1 Google | 1 Tensorflow | 2025-04-23 | 6.5 Medium |
Tensorflow is an Open Source Machine Learning Framework. An attacker can trigger denial of service via assertion failure by altering a `SavedModel` on disk such that `AttrDef`s of some operation are duplicated. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | ||||
CVE-2022-23564 | 1 Google | 1 Tensorflow | 2025-04-23 | 6.5 Medium |
Tensorflow is an Open Source Machine Learning Framework. When decoding a resource handle tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments. This allows attackers to cause denial of services in TensorFlow processes. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | ||||
CVE-2022-23561 | 1 Google | 1 Tensorflow | 2025-04-23 | 8.8 High |
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause a write outside of bounds of an array in TFLite. In fact, the attacker can override the linked list used by the memory allocator. This can be leveraged for an arbitrary write primitive under certain conditions. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | ||||
CVE-2022-29210 | 1 Google | 1 Tensorflow | 2025-04-23 | 5.5 Medium |
TensorFlow is an open source platform for machine learning. In version 2.8.0, the `TensorKey` hash function used total estimated `AllocatedBytes()`, which (a) is an estimate per tensor, and (b) is a very poor hash function for constants (e.g. `int32_t`). It also tried to access individual tensor bytes through `tensor.data()` of size `AllocatedBytes()`. This led to ASAN failures because the `AllocatedBytes()` is an estimate of total bytes allocated by a tensor, including any pointed-to constructs (e.g. strings), and does not refer to contiguous bytes in the `.data()` buffer. The discoverers could not use this byte vector anyway because types such as `tstring` include pointers, whereas they needed to hash the string values themselves. This issue is patched in Tensorflow versions 2.9.0 and 2.8.1. | ||||
CVE-2022-31055 | 1 Google | 1 Kctf | 2025-04-23 | 7.5 High |
kCTF is a Kubernetes-based infrastructure for capture the flag (CTF) competitions. Prior to version 1.6.0, the kctf cluster set-src-ip-ranges was broken and allowed traffic from any IP. The problem has been patched in v1.6.0. As a workaround, those who want to test challenges privately can mark them as `public: false` and use `kctf chal debug port-forward` to connect. | ||||
CVE-2025-3619 | 1 Google | 1 Chrome | 2025-04-23 | 8.8 High |
Heap buffer overflow in Codecs in Google Chrome on Windows prior to 135.0.7049.95 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical) | ||||
CVE-2025-3620 | 1 Google | 1 Chrome | 2025-04-23 | 8.8 High |
Use after free in USB in Google Chrome prior to 135.0.7049.95 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | ||||
CVE-2022-35934 | 1 Google | 1 Tensorflow | 2025-04-23 | 5.9 Medium |
TensorFlow is an open source platform for machine learning. The implementation of tf.reshape op in TensorFlow is vulnerable to a denial of service via CHECK-failure (assertion failure) caused by overflowing the number of elements in a tensor. This issue has been patched in GitHub commit 61f0f9b94df8c0411f0ad0ecc2fec2d3f3c33555. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue. |