You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[PDSA-2022-001](./advisory/pdsa-2022-001.md)| OOB read in gather_tree | < 2.4 | Wang Xuan(王旋) of Qihoo 360 AIVul Team ||
13
+
|[PDSA-2022-002](./advisory/pdsa-2022-002.md)| Code injection in paddle.audio.functional.get_window | = 2.4.0-rc0 | Tong Liu of ShanghaiTech University ||
|[PDSA-2022-001](./advisory/pdsa-2022-001_cn.md)| OOB read in gather_tree | < 2.4 | Wang Xuan(王旋) of Qihoo 360 AIVul Team ||
13
+
|[PDSA-2022-002](./advisory/pdsa-2022-002_cn.md)| Code injection in paddle.audio.functional.get_window | = 2.4.0-rc0 | Tong Liu of ShanghaiTech University ||
## PDSA-2022-002: Code injection in paddle.audio.functional.get_window
2
+
3
+
### Impact
4
+
5
+
`paddle.audio.functional.get_windowis` vulnerable to a code injection as it calls `eval` on user supplied `winstr`. This may lead to arbitrary code execution.
6
+
7
+
```python
8
+
defget_window(
9
+
window: Union[str, Tuple[str, float]],
10
+
win_length: int,
11
+
fftbins: bool=True,
12
+
dtype: str='float64',
13
+
) -> Tensor:
14
+
...
15
+
try:
16
+
winfunc =eval('_'+ winstr)
17
+
exceptNameErroras e:
18
+
raiseValueError("Unknown window type.") from e
19
+
```
20
+
21
+
### Patches
22
+
23
+
We have patched the issue in commit [26c419ca386aeae3c461faf2b828d00b48e908eb](https://github.com/PaddlePaddle/Paddle/commit/26c419ca386aeae3c461faf2b828d00b48e908eb).
24
+
25
+
The fix will be included in PaddlePaddle 2.4.
26
+
27
+
### For more information
28
+
29
+
Please consult [our security guide](../../SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
30
+
31
+
### Attribution
32
+
33
+
This vulnerability has been reported by Tong Liu of ShanghaiTech University.
0 commit comments