Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-46742: Paddle/pdsa-2022-002.md at develop · PaddlePaddle/Paddle

Code injection in paddle.audio.functional.get_window in PaddlePaddle 2.4.0-rc0 allows arbitrary code execution.

CVE
#vulnerability

Permalink

PDSA-2022-002: Code injection in paddle.audio.functional.get_window****Impact

paddle.audio.functional.get_windowis vulnerable to a code injection as it calls eval on user supplied winstr. This may lead to arbitrary code execution.

def get_window( window: Union[str, Tuple[str, float]], win_length: int, fftbins: bool = True, dtype: str = 'float64’, ) -> Tensor: … try: winfunc = eval(‘_’ + winstr) except NameError as e: raise ValueError(“Unknown window type.”) from e

Patches

We have patched the issue in commit 26c419ca386aeae3c461faf2b828d00b48e908eb.

The fix will be included in PaddlePaddle 2.4.

For more information

Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.

Attribution

This vulnerability has been reported by Tong Liu of ShanghaiTech University.

Related news

GHSA-gcjf-29m9-888q: PaddlePaddle vulnerable to Code Injection

Code injection in `paddle.audio.functional.get_window` in PaddlePaddle 2.4.0-rc0 allows arbitrary code execution. A [patch](https://github.com/PaddlePaddle/Paddle/commit/26c419ca386aeae3c461faf2b828d00b48e908eb) is available on the `develop` branch of the repository and anticipated to be part of a 2.4 release.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907