Skip to content

Comments

Security fuzz address sanitizer fix Bug #2 and #3#21528

Merged
tianleiwu merged 1 commit intomainfrom
jingywa/security-fix1
Jul 27, 2024
Merged

Security fuzz address sanitizer fix Bug #2 and #3#21528
tianleiwu merged 1 commit intomainfrom
jingywa/security-fix1

Conversation

@jingyanwangms
Copy link
Contributor

Description

Security fuzz test with address sanitizer found several bugs

Motivation and Context

@tianleiwu tianleiwu merged commit 48fb8a7 into main Jul 27, 2024
@tianleiwu tianleiwu deleted the jingywa/security-fix1 branch July 27, 2024 18:10
if ((node.GetOutputEdgesCount() >= 2 && node.GetOutputEdgesCount() <= 6) && // Add node.GetOutputEdgesCount() == 5/6 for distilbert
graph_utils::IsSupportedOptypeVersionAndDomain(node, "LayerNormalization", {1, 17}, kOnnxDomain) &&
graph_utils::IsSupportedProvider(node, GetCompatibleExecutionProviders())) {
graph_utils::IsSupportedProvider(node, GetCompatibleExecutionProviders()) && node.InputDefs().size() > 2) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This should also check node.InputDefs()[2]->Exists().

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes. That's an optional input. I will add an extra check later.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants