ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
PyPI | PYSEC-2021-209 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.SdcaOptimizer` triggers undefined behavior due to dereferencing a null pointer. The implementation(https://github.com/tensorflow/tensorflow/blob/60a45c8b6192a4699f2e2709a2645a751d435cc3/tensorflow/core/kernels/sdca_internal.cc) does not validate that the user supplied arguments satisfy all constraints expected by the op(https://www.tensorflow.org/api_docs/python/tf/raw_ops/SdcaOptimizer). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-5gqf-456p-4836', 'CVE-2021-29572'} | 2021-08-27T03:22:34.191182Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5gqf-456p-4836', 'https://github.com/tensorflow/tensorflow/commit/f7cc8755ac6683131fdfa7a8a121f9d7a9dec6fb'} | null |
PyPI | PYSEC-2021-659 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a denial of service via a `CHECK` failure by passing an empty image to `tf.raw_ops.DrawBoundingBoxes`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/ea34a18dc3f5c8d80a40ccca1404f343b5d55f91/tensorflow/core/kernels/image/draw_bounding_box_op.cc#L148-L165) uses `CHECK_*` assertions instead of `OP_REQUIRES` to validate user controlled inputs. Whereas `OP_REQUIRES` allows returning an error condition back to the user, the `CHECK_*` macros result in a crash if the condition is false, similar to `assert`. In this case, `height` is 0 from the `images` input. This results in `max_box_row_clamp` being negative and the assertion being falsified, followed by aborting program execution. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-393f-2jr3-cp69', 'CVE-2021-29533'} | 2021-12-09T06:35:20.437161Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/b432a38fe0e1b4b904a6c222cbce794c39703e87', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-393f-2jr3-cp69'} | null |
PyPI | PYSEC-2021-16 | null | httplib2 is a comprehensive HTTP client library for Python. In httplib2 before version 0.19.0, a malicious server which responds with long series of "\xa0" characters in the "www-authenticate" header may cause Denial of Service (CPU burn while parsing header) of the httplib2 client accessing said server. This is fixed in version 0.19.0 which contains a new implementation of auth headers parsing using the pyparsing library. | {'CVE-2021-21240', 'GHSA-93xj-8mrv-444m'} | 2021-02-12T14:56:00Z | 2021-02-08T20:15:00Z | null | null | null | {'https://github.com/httplib2/httplib2/commit/bd9ee252c8f099608019709e22c0d705e98d26bc', 'https://github.com/httplib2/httplib2/pull/182', 'https://github.com/httplib2/httplib2/security/advisories/GHSA-93xj-8mrv-444m', 'https://pypi.org/project/httplib2'} | null |
PyPI | GHSA-6p52-jr3q-c94g | Arbitrary code execution due to YAML deserialization | ### Impact
Nameko can be tricked to perform arbitrary code execution when deserialising a YAML config file. Example:
``` yaml
# malicious.yaml
!!python/object/new:type
args: ['z', !!python/tuple [], {'extend': !!python/name:exec }]
listitems: "__import__('os').system('cat /etc/passwd')"
```
``` shell
$ nameko run --config malicious.yaml test
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
...
```
### Patches
The problem was fixed in https://github.com/nameko/nameko/pull/722 and released in version 2.14.0, and in rc10 of the v3 pre-release.
Versions prior to 2.14.0, and v3.0.0rc0 through v3.0.0rc9 are still vulnerable.
### Workarounds
The vulnerability is exploited by config files with malicious content. It can be avoided by only using config files that you trust. | {'CVE-2021-41078'} | 2022-03-03T05:13:47.698322Z | 2021-10-19T15:28:57Z | HIGH | null | {'CWE-502'} | {'https://github.com/nameko/nameko/releases/tag/v2.14.0', 'https://github.com/nameko/nameko/releases/tag/v3.0.0-rc10', 'https://github.com/nameko/nameko', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41078', 'https://github.com/nameko/nameko/security/advisories/GHSA-6p52-jr3q-c94g'} | null |
PyPI | PYSEC-2021-136 | null | A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the IPv6 addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations. Only deployments using the Open vSwitch driver are affected. Source: OpenStack project. Versions before openstack-neutron 15.3.3, openstack-neutron 16.3.1 and openstack-neutron 17.1.1 are affected. | {'CVE-2021-20267'} | 2021-08-27T03:22:08.884816Z | 2021-05-28T19:15:00Z | null | null | null | {'https://bugzilla.redhat.com/show_bug.cgi?id=1934330'} | null |
PyPI | GHSA-2f9x-5v75-3qv4 | Moderate severity vulnerability that affects django | An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable. | {'CVE-2018-7537'} | 2022-03-03T05:13:46.373778Z | 2019-01-04T17:50:00Z | MODERATE | null | {'CWE-185'} | {'https://usn.ubuntu.com/3591-1/', 'https://www.djangoproject.com/weblog/2018/mar/06/security-releases/', 'https://github.com/advisories/GHSA-2f9x-5v75-3qv4', 'http://www.securityfocus.com/bid/103357', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://www.debian.org/security/2018/dsa-4161', 'https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html', 'https://access.redhat.com/errata/RHSA-2019:0265', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7537'} | null |
PyPI | PYSEC-2014-67 | null | Products/CMFPlone/FactoryTool.py in Plone 3.3 through 4.3.2 allows remote attackers to obtain the installation path via vectors related to a file object for unspecified documentation which is initialized in class scope. | {'CVE-2013-7060'} | 2021-07-25T23:34:50.035277Z | 2014-05-02T14:55:00Z | null | null | null | {'http://www.openwall.com/lists/oss-security/2013/12/10/15', 'https://plone.org/security/20131210/path-leak', 'http://www.openwall.com/lists/oss-security/2013/12/12/3'} | null |
PyPI | GHSA-2x54-j4m3-r6wx | High severity vulnerability that affects sqla-yaml-fixtures | Sqla_yaml_fixtures 0.9.1 allows local users to execute arbitrary python code via the fixture_text argument in sqla_yaml_fixtures.load. | {'CVE-2019-3575'} | 2022-03-03T05:13:54.824008Z | 2019-01-04T17:44:48Z | HIGH | null | {'CWE-94'} | {'https://github.com/schettino72/sqla_yaml_fixtures', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3575', 'https://github.com/advisories/GHSA-2x54-j4m3-r6wx', 'https://github.com/schettino72/sqla_yaml_fixtures/issues/20'} | null |
PyPI | PYSEC-2021-566 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can trigger a crash via a floating point exception in `tf.raw_ops.ResourceGather`. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/resource_variable_ops.cc#L725-L731) computes the value of a value, `batch_size`, and then divides by it without checking that this value is not 0. We have patched the issue in GitHub commit ac117ee8a8ea57b73d34665cdf00ef3303bc0b11. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'GHSA-qjj8-32p7-h289', 'CVE-2021-37653'} | 2021-12-09T06:35:03.512666Z | 2021-08-12T18:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qjj8-32p7-h289', 'https://github.com/tensorflow/tensorflow/commit/ac117ee8a8ea57b73d34665cdf00ef3303bc0b11'} | null |
PyPI | GHSA-pgww-xf46-h92r | XSS in lxml | A XSS vulnerability was discovered in python-lxml's clean module. The module's parser didn't properly imitate browsers, which caused different behaviors between the sanitizer and the user's page. A remote attacker could exploit this flaw to run arbitrary HTML/JS code. | {'CVE-2020-27783'} | 2022-03-03T05:14:14.706013Z | 2021-01-07T21:54:01Z | MODERATE | null | {'CWE-79'} | {'https://pypi.org/project/lxml/', 'https://security.netapp.com/advisory/ntap-20210521-0003/', 'https://snyk.io/vuln/SNYK-PYTHON-LXML-1047473', 'https://advisory.checkmarx.net/advisory/CX-2020-4286', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKG67GPGTV23KADT4D4GK4RMHSO4CIQL/', 'https://www.debian.org/security/2020/dsa-4810', 'https://github.com/lxml/lxml/commit/a105ab8dc262ec6735977c25c13f0bdfcdec72a7', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMHVKRUT22LVWNL3TB7HPSDHJT74Q3JK/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27783', 'https://bugzilla.redhat.com/show_bug.cgi?id=1901633', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00028.html'} | null |
PyPI | PYSEC-2020-136 | null | In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger a denial of service by causing an out of memory allocation in the implementation of segment sum. Since code uses the last element of the tensor holding them to determine the dimensionality of output tensor, attackers can use a very large value to trigger a large allocation. The issue is patched in commit 204945b19e44b57906c9344c0d00120eeeae178a and is released in TensorFlow versions 2.2.1, or 2.3.1. A potential workaround would be to add a custom `Verifier` to limit the maximum value in the segment ids tensor. This only handles the case when the segment ids are stored statically in the model, but a similar validation could be done if the segment ids are generated at runtime, between inference steps. However, if the segment ids are generated as outputs of a tensor during inference steps, then there are no possible workaround and users are advised to upgrade to patched code. | {'CVE-2020-15213', 'GHSA-hjmq-236j-8m87'} | 2020-10-01T23:15:00Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hjmq-236j-8m87', 'https://github.com/tensorflow/tensorflow/commit/204945b19e44b57906c9344c0d00120eeeae178a'} | null |
PyPI | PYSEC-2010-24 | null | The ftp_STOU function in FTPServer.py in pyftpdlib before 0.2.0 does not limit the number of attempts to discover a unique filename, which might allow remote authenticated users to cause a denial of service via a STOU command. | {'CVE-2007-6740'} | 2010-10-20T04:00:00Z | 2010-10-19T20:00:00Z | null | null | null | {'http://code.google.com/p/pyftpdlib/issues/detail?id=25', 'http://code.google.com/p/pyftpdlib/source/detail?r=37', 'http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY', 'http://code.google.com/p/pyftpdlib/source/diff?spec=svn37&r=37&format=side&path=/trunk/pyftpdlib/FTPServer.py'} | null |
PyPI | PYSEC-2021-835 | null | TensorFlow is an open source platform for machine learning. In affected versions TensorFlow's `saved_model_cli` tool is vulnerable to a code injection as it calls `eval` on user supplied strings. This can be used by attackers to run arbitrary code on the plaform where the CLI tool runs. However, given that the tool is always run manually, the impact of this is not severe. We have patched this by adding a `safe` flag which defaults to `True` and an explicit warning for users. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {'GHSA-3rcw-9p9x-582v', 'CVE-2021-41228'} | 2021-12-09T06:35:45.436106Z | 2021-11-05T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3rcw-9p9x-582v', 'https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7'} | null |
PyPI | PYSEC-2018-44 | null | Ansible "User" module leaks any data which is passed on as a parameter to ssh-keygen. This could lean in undesirable situations such as passphrases credentials passed as a parameter for the ssh-keygen executable. Showing those credentials in clear text form for every user which have access just to the process list. | {'CVE-2018-16837'} | 2021-07-02T02:41:34.271290Z | 2018-10-23T15:29:00Z | null | null | null | {'http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html', 'https://www.debian.org/security/2019/dsa-4396', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16837', 'http://www.securityfocus.com/bid/105700', 'https://usn.ubuntu.com/4072-1/', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html', 'https://access.redhat.com/errata/RHSA-2018:3463', 'https://access.redhat.com/errata/RHSA-2018:3461', 'https://access.redhat.com/errata/RHSA-2018:3462', 'https://access.redhat.com/errata/RHSA-2018:3460', 'https://access.redhat.com/security/cve/cve-2018-16837', 'https://access.redhat.com/errata/RHSA-2018:3505', 'https://lists.debian.org/debian-lts-announce/2018/11/msg00012.html'} | null |
PyPI | PYSEC-2019-170 | null | An issue was discovered in python-engineio through 3.8.2. There is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability that allows attackers to make WebSocket connections to a server by using a victim's credentials, because the Origin header is not restricted. | {'GHSA-j3jp-gvr5-7hwq', 'CVE-2019-13611'} | 2021-08-25T04:30:27.861588Z | 2019-07-16T00:15:00Z | null | null | null | {'https://github.com/advisories/GHSA-j3jp-gvr5-7hwq', 'https://github.com/miguelgrinberg/python-engineio/issues/128'} | null |
PyPI | PYSEC-2022-10 | null | PIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method. | {'GHSA-8vj2-vxx3-667w', 'CVE-2022-22817'} | 2022-01-24T23:48:19.853348Z | 2022-01-10T14:12:00Z | null | null | null | {'https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html', 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#restrict-builtins-available-to-imagemath-eval', 'https://github.com/advisories/GHSA-8vj2-vxx3-667w'} | null |
PyPI | GHSA-xrr4-74mc-rpjc | Pyro mishandles pid files in temporary directory locations and opening the pid file as root | pyro before 3.15 unsafely handles pid files in temporary directory locations and opening the pid file as root. An attacker can use this flaw to overwrite arbitrary files via symlinks. | {'CVE-2011-2765'} | 2022-04-26T18:32:54.526435Z | 2018-08-21T17:01:29Z | HIGH | null | {'CWE-59'} | {'https://github.com/advisories/GHSA-xrr4-74mc-rpjc', 'https://bugs.debian.org/631912', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2765', 'https://pythonhosted.org/Pyro/12-changes.html', 'https://github.com/irmen/Pyro3', 'https://github.com/irmen/Pyro3/commit/554e095a62c4412c91f981e72fd34a936ac2bf1e'} | null |
PyPI | PYSEC-2014-88 | null | python-bugzilla before 0.9.0 does not validate X.509 certificates, which allows man-in-the-middle attackers to spoof Bugzilla servers via a crafted certificate. | {'CVE-2013-2191'} | 2021-08-27T03:22:17.861270Z | 2014-02-08T00:55:00Z | null | null | null | {'https://git.fedorahosted.org/cgit/python-bugzilla.git/commit/?id=a782282ee479ba4cc1b8b1d89700ac630ba83eef', 'http://www.openwall.com/lists/oss-security/2013/06/19/6', 'https://bugzilla.redhat.com/show_bug.cgi?id=951594', 'http://lists.opensuse.org/opensuse-updates/2013-07/msg00025.html', 'http://lists.opensuse.org/opensuse-updates/2013-07/msg00026.html', 'https://lists.fedorahosted.org/pipermail/python-bugzilla/2013-June/000104.html'} | null |
PyPI | PYSEC-2021-589 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.SparseFillEmptyRows`. The shape inference [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/ops/sparse_ops.cc#L608-L634) does not validate that the input arguments are not empty tensors. We have patched the issue in GitHub commit 578e634b4f1c1c684d4b4294f9e5281b2133b3ed. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'CVE-2021-37676', 'GHSA-v768-w7m9-2vmm'} | 2021-12-09T06:35:05.480275Z | 2021-08-12T22:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/578e634b4f1c1c684d4b4294f9e5281b2133b3ed', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v768-w7m9-2vmm'} | null |
PyPI | PYSEC-2021-423 | null | An issue in Gate One 1.2.0 allows attackers to bypass to the verification check done by the origins list and connect to Gate One instances used by hosts not on the origins list. | {'CVE-2020-19003', 'GHSA-q6j2-g8qf-wvf7'} | 2021-11-16T03:58:44.124463Z | 2021-10-06T13:15:00Z | null | null | null | {'https://github.com/liftoff/GateOne/issues/728', 'https://github.com/advisories/GHSA-q6j2-g8qf-wvf7'} | null |
PyPI | PYSEC-2017-77 | null | The swri_audio_convert function in audioconvert.c in FFmpeg libswresample through 3.0.101, as used in FFmpeg 3.4.1, aubio 0.4.6, and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted audio file. | {'CVE-2017-17555'} | 2021-08-25T04:29:55.717031Z | 2017-12-12T01:29:00Z | null | null | null | {'https://github.com/IvanCql/vulnerability/blob/master/An%20NULL%20pointer%20dereference(DoS)%20Vulnerability%20was%20found%20in%20function%20swri_audio_convert%20of%20ffmpeg%20libswresample.md', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00012.html'} | null |
PyPI | GHSA-v936-j8gp-9q3p | Open redirects on some federation and push requests | ### Impact
Requests to user provided domains were not restricted to external IP addresses when calculating the key validity for third-party invite events and sending push notifications. This could cause Synapse to make requests to internal infrastructure. The type of request was not controlled by the user, although limited modification of request bodies was possible.
For the most thorough protection server administrators should remove the deprecated `federation_ip_range_blacklist` from their settings after upgrading to Synapse v1.25.0 which will result in Synapse using the improved default IP address restrictions. See the new `ip_range_blacklist` and `ip_range_whitelist` settings if more specific control is necessary.
### Patches
Issue is resolved by #8821. Further improvements to protect homeservers by default were made in #8870 and #8954.
### Workarounds
Requests to internal IP addresses could be blocked at the system or network level. | {'CVE-2021-21273'} | 2022-03-03T05:14:08.012098Z | 2021-02-26T17:28:34Z | LOW | null | {'CWE-601'} | {'https://github.com/matrix-org/synapse/security/advisories/GHSA-v936-j8gp-9q3p', 'https://github.com/matrix-org/synapse/commit/30fba6210834a4ecd91badf0c8f3eb278b72e746', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/', 'https://github.com/matrix-org/synapse/releases/tag/v1.25.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21273', 'https://github.com/matrix-org/synapse', 'https://github.com/matrix-org/synapse/pull/8821'} | null |
PyPI | PYSEC-2013-34 | null | Graphite 0.9.5 through 0.9.10 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to (1) remote_storage.py, (2) storage.py, (3) render/datalib.py, and (4) whitelist/views.py, a different vulnerability than CVE-2013-5093. | {'CVE-2013-5942'} | 2021-11-16T21:20:28.715114Z | 2013-09-27T10:08:00Z | null | null | null | {'https://github.com/graphite-project/graphite-web/blob/master/docs/releases/0_9_11.rst', 'http://secunia.com/advisories/54556'} | null |
PyPI | GHSA-9jhm-8m8c-c3f4 | SSRF in Sydent due to missing validation of hostnames | ### Impact
Sydent can be induced to send HTTP GET requests to internal systems, due to lack of parameter validation or IP address blacklisting.
It is not possible to exfiltrate data or control request headers, but it might be possible to use the attack to perform an internal port enumeration.
### Patches
Fixed in 9e57334, 8936925, 3d531ed, 0f00412
### Workarounds
A potential workaround would be to use a firewall to ensure that Sydent cannot reach internal HTTP resources.
### For more information
If you have any questions or comments about this advisory, email us at security@matrix.org. | {'CVE-2021-29431'} | 2022-03-03T05:14:17.907013Z | 2021-04-19T14:54:15Z | HIGH | null | {'CWE-20', 'CWE-918'} | {'https://github.com/matrix-org/sydent/commit/9e573348d81df8191bbe8c266c01999c9d57cd5f', 'https://github.com/matrix-org/sydent/commit/0f00412017f25619bc36c264b29ea96808bf310a', 'https://github.com/matrix-org/sydent/releases/tag/v2.3.0', 'https://github.com/matrix-org/sydent/commit/8936925f561b0c352c2fa922d5097d7245aad00a', 'https://github.com/matrix-org/sydent/commit/3d531ed50d2fd41ac387f36d44d3fb2c62dd22d3', 'https://pypi.org/project/matrix-sydent/', 'https://github.com/matrix-org/sydent/security/advisories/GHSA-9jhm-8m8c-c3f4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29431'} | null |
PyPI | GHSA-5jqp-qgf6-3pvh | Use of "infinity" as an input to datetime and date fields causes infinite loop in pydantic |
Impact
Passing either 'infinity', 'inf' or float('inf') (or their negatives) to datetime or date fields causes validation to run forever with 100% CPU usage (on one CPU).
Patches
Pydantic is be patched with fixes available in the following versions:
v1.8.2
v1.7.4
v1.6.2
All these versions are available on pypi, and will be available on conda-forge soon.
See the changelog for details.
Workarounds
If you absolutely can't upgrade, you can work around this risk using a validator to catch these values, brief demo:
from datetime import date
from pydantic import BaseModel, validator
class DemoModel(BaseModel):
date_of_birth: date
@validator('date_of_birth', pre=True)
def skip_infinite_values(cls, v):
try:
seconds = float(v)
except (ValueError, TypeError):
return v
else:
if seconds == float('inf'):
return date.max
elif seconds == float('-inf'):
return date.min
else:
return seconds
Note: this is not an ideal solution (in particular you'll need a slightly different function for datetimes), instead of a hack like this you should upgrade pydantic.
If you are not using v1.8.x, v1.7.x or v1.6.x and are unable to upgrade to a fixed version of pydantic, please create an issue requesting a back-port, and we will endeavour to release a patch for earlier versions of pydantic.
References
This was fixed in commit 7e83fdd.
| {'CVE-2021-29510'} | 2022-03-03T05:13:24.568205Z | 2021-05-13T20:23:17Z | LOW | null | {'CWE-835'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMKAJX4O6IGBBCE32CO2G7PZQCCQSBLV/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UEFWM7DYKD2ZHE7R5YT5EQWJPV4ZKYRB/', 'https://github.com/samuelcolvin/pydantic/security/advisories/GHSA-5jqp-qgf6-3pvh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29510', 'https://github.com/samuelcolvin/pydantic/commit/7e83fdd2563ffac081db7ecdf1affa65ef38c468', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2HT266L6Q7H6ICP7DFGXOGBJHNNKMKB/'} | null |
PyPI | GHSA-xfrw-hxr5-ghqf | Cross-site Scripting in wagtail | ### Impact
When the `{% include_block %}` template tag is used to output the value of a plain-text StreamField block (`CharBlock`, `TextBlock` or a similar user-defined block derived from `FieldBlock`), and that block does not specify a template for rendering, the tag output is not properly escaped as HTML. This could allow users to insert arbitrary HTML or scripting. This vulnerability is only exploitable by users with the ability to author StreamField content (i.e. users with 'editor' access to the Wagtail admin).
### Patches
Patched versions have been released as Wagtail 2.11.8 (for the LTS 2.11 branch), Wagtail 2.12.5, and Wagtail 2.13.2 (for the current 2.13 branch).
Site implementors who wish to retain the existing behaviour of allowing editors to insert HTML content in these blocks (and are willing to accept the risk of untrusted editors inserting arbitrary code) may disable the escaping by surrounding the relevant `{% include_block %}` tag in `{% autoescape off %}...{% endautoescape %}`.
### Workarounds
Site implementors who are unable to upgrade to a current supported version should audit their use of `{% include_block %}` to ensure it is not used to output `CharBlock` / `TextBlock` values with no associated template. Note that this only applies where `{% include_block %}` is used directly on that block (uses of `include_block` on a block _containing_ a CharBlock / TextBlock, such as a StructBlock, are unaffected). In these cases, the tag can be replaced with Django's `{{ ... }}` syntax - e.g. `{% include_block my_title_block %}` becomes `{{ my_title_block }}`.
### Acknowledgements
Many thanks to Karen Tracey for reporting this issue.
### For more information
If you have any questions or comments about this advisory:
* Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html)
* Email us at security@wagtail.io (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`)
| {'CVE-2021-32681'} | 2022-03-03T05:13:02.133305Z | 2021-06-17T20:10:42Z | MODERATE | null | {'CWE-79'} | {'https://github.com/wagtail/wagtail/security/advisories/GHSA-xfrw-hxr5-ghqf', 'https://github.com/wagtail/wagtail/releases/tag/v2.12.5', 'https://github.com/wagtail/wagtail/releases/tag/v2.13.2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32681', 'https://github.com/wagtail/wagtail/releases/tag/v2.11.8'} | null |
PyPI | PYSEC-2010-9 | null | ftpserver.py in pyftpdlib before 0.5.2 does not require the l permission for the MLST command, which allows remote authenticated users to bypass intended access restrictions and list the root directory via an FTP session. | {'CVE-2009-5012'} | 2021-07-05T00:01:24.817551Z | 2010-10-19T20:00:00Z | null | null | null | {'http://code.google.com/p/pyftpdlib/source/detail?r=596', 'http://code.google.com/p/pyftpdlib/source/diff?spec=svn596&r=596&format=side&path=/trunk/pyftpdlib/ftpserver.py', 'http://code.google.com/p/pyftpdlib/issues/detail?id=114', 'http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY'} | null |
PyPI | GHSA-rcrv-228c-gprj | Invalid URL generation in bitlyshortener | ### Impact
Due to a sudden upstream breaking change by Bitly, versions of `bitlyshortener` <0.6.0 generate invalid short URLs. All users are affected and must update immediately.
### Patches
Upgrading `bitlyshortener` to 0.6.0 or newer will prevent the generation such invalid short URLs.
### Workarounds
A workaround is to replace "https://j.mp/" in each generated short URL with "https://bit.ly/".
### References
* [Release notes](https://github.com/impredicative/bitlyshortener/releases) | null | 2022-03-03T05:12:58.970600Z | 2022-01-21T18:39:40Z | MODERATE | null | null | {'https://github.com/impredicative/bitlyshortener/security/advisories/GHSA-rcrv-228c-gprj', 'https://github.com/impredicative/bitlyshortener/releases/tag/0.6.0', 'https://github.com/impredicative/bitlyshortener', 'https://github.com/impredicative/bitlyshortener/commit/b307d70bedf745305fa0dd3c5c600d8cb88d09b5'} | null |
PyPI | PYSEC-2017-98 | null | Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information leakage attacks. This vulnerability affects users using versions 1.17 and 1.18 of the urllib3 library, who are using the optional PyOpenSSL support for TLS instead of the regular standard library TLS backend, and who are using OpenSSL 1.1.0 via PyOpenSSL. This is an extremely uncommon configuration, so the security impact of this vulnerability is low. | {'CVE-2016-9015'} | 2021-08-27T03:42:51.689777Z | 2017-01-11T16:59:00Z | null | null | null | {'http://www.openwall.com/lists/oss-security/2016/10/27/6', 'http://www.securityfocus.com/bid/93941'} | null |
PyPI | PYSEC-2020-95 | null | In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared key. This can be leveraged to execute shell commands on the host machine. This does not affect Spark clusters using other resource managers (YARN, Mesos, etc). | {'CVE-2020-9480'} | 2021-04-02T12:15:00Z | 2020-06-23T22:15:00Z | null | null | null | {'https://lists.apache.org/thread.html/ra0e62a18ad080c4ce6df5e0202a27eaada75222761efc3f7238b5a3b@%3Ccommits.doris.apache.org%3E', 'https://spark.apache.org/security.html#CVE-2020-9480', 'https://lists.apache.org/thread.html/ree9e87aae81852330290a478692e36ea6db47a52a694545c7d66e3e2@%3Cdev.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rb3956440747e41940d552d377d50b144b60085e7ff727adb0e575d8d@%3Ccommits.submarine.apache.org%3E', 'https://lists.apache.org/thread.html/r03ad9fe7c07d6039fba9f2152d345274473cb0af3d8a4794a6645f4b@%3Cuser.spark.apache.org%3E'} | null |
PyPI | PYSEC-2018-13 | null | An issue was discovered in markdown2 (aka python-markdown2) through 2.3.5. The safe_mode feature, which is supposed to sanitize user input against XSS, is flawed and does not escape the input properly. With a crafted payload, XSS can be triggered, as demonstrated by omitting the final '>' character from an IMG tag. | {'GHSA-p6h9-gw49-rqm4', 'CVE-2018-5773'} | 2021-06-16T00:03:23.657711Z | 2018-01-18T21:29:00Z | null | null | null | {'https://github.com/trentm/python-markdown2/issues/285', 'https://github.com/advisories/GHSA-p6h9-gw49-rqm4'} | null |
PyPI | PYSEC-2021-862 | null | Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.4.2), Python (versions prior to 1.6.1), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.3) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores on MacOS. This issue has been addressed in aws-c-io submodule versions 0.10.5 onward. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.4.2 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.6.1 on macOS. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on macOS. Amazon Web Services AWS-C-IO 0.10.4 on macOS. | {'GHSA-743r-5g92-5vgf', 'CVE-2021-40829'} | 2022-01-05T02:16:12.435653Z | 2021-11-23T00:15:00Z | null | null | null | {'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://github.com/advisories/GHSA-743r-5g92-5vgf', 'https://github.com/aws/aws-iot-device-sdk-cpp-v2', 'https://github.com/awslabs/aws-c-io/'} | null |
PyPI | PYSEC-2020-161 | null | A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected. | {'GHSA-gwr8-5j83-483c', 'CVE-2019-14904'} | 2021-01-28T18:00:00Z | 2020-08-26T03:15:00Z | null | null | null | {'https://github.com/ansible/ansible/pull/65686', 'https://github.com/advisories/GHSA-gwr8-5j83-483c', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1776944'} | null |
PyPI | GHSA-x83m-p7pv-ch8v | Division by 0 in `QuantizedAdd` | ### Impact
An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.QuantizedAdd`:
```python
import tensorflow as tf
x = tf.constant([68, 228], shape=[2, 1], dtype=tf.quint8)
y = tf.constant([], shape=[2, 0], dtype=tf.quint8)
min_x = tf.constant(10.723421015884028)
max_x = tf.constant(15.19578006631113)
min_y = tf.constant(-5.539003866682977)
max_y = tf.constant(42.18819949559947)
tf.raw_ops.QuantizedAdd(x=x, y=y, min_x=min_x, max_x=max_x, min_y=min_y, max_y=max_y)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/6f26b3f3418201479c264f2a02000880d8df151c/tensorflow/core/kernels/quantized_add_op.cc#L289-L295) computes a modulo operation without validating that the divisor is not zero.
```cc
void VectorTensorAddition(const T* vector_data, float min_vector,
float max_vector, int64 vector_num_elements,
const T* tensor_data, float min_tensor,
float max_tensor, int64 tensor_num_elements,
float output_min, float output_max, Toutput* output) {
for (int i = 0; i < tensor_num_elements; ++i) {
const int64 vector_i = i % vector_num_elements;
...
}
}
```
Since `vector_num_elements` is [determined based on input shapes](https://github.com/tensorflow/tensorflow/blob/6f26b3f3418201479c264f2a02000880d8df151c/tensorflow/core/kernels/quantized_add_op.cc#L522-L544), a user can trigger scenarios where this quantity is 0.
### Patches
We have patched the issue in GitHub commit [744009c9e5cc5d0447f0dc39d055f917e1fd9e16](https://github.com/tensorflow/tensorflow/commit/744009c9e5cc5d0447f0dc39d055f917e1fd9e16).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29549'} | 2022-03-03T05:12:52.895242Z | 2021-05-21T14:23:38Z | LOW | null | {'CWE-369'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29549', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x83m-p7pv-ch8v', 'https://github.com/tensorflow/tensorflow/commit/744009c9e5cc5d0447f0dc39d055f917e1fd9e16'} | null |
PyPI | PYSEC-2021-531 | null | TensorFlow is an end-to-end open source platform for machine learning. A specially crafted TFLite model could trigger an OOB write on heap in the TFLite implementation of `ArgMin`/`ArgMax`(https://github.com/tensorflow/tensorflow/blob/102b211d892f3abc14f845a72047809b39cc65ab/tensorflow/lite/kernels/arg_min_max.cc#L52-L59). If `axis_value` is not a value between 0 and `NumDimensions(input)`, then the condition in the `if` is never true, so code writes past the last valid element of `output_dims->data`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-crch-j389-5f84', 'CVE-2021-29603'} | 2021-12-09T06:34:59.386976Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-crch-j389-5f84', 'https://github.com/tensorflow/tensorflow/commit/c59c37e7b2d563967da813fa50fe20b21f4da683'} | null |
PyPI | PYSEC-2014-30 | null | python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to createObject. | {'CVE-2012-5488'} | 2021-09-01T08:44:29.194034Z | 2014-09-30T14:55:00Z | null | null | null | {'https://plone.org/products/plone-hotfix/releases/20121106', 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt', 'https://plone.org/products/plone/security/advisories/20121106/04', 'http://www.openwall.com/lists/oss-security/2012/11/10/1', 'http://rhn.redhat.com/errata/RHSA-2014-1194.html'} | null |
PyPI | GHSA-wq5h-f9p5-q7fx | Improper validation of URLs ('Cross-site Scripting') in Wagtail rich text fields | ### Impact
When saving the contents of a rich text field in the admin interface, Wagtail does not apply server-side checks to ensure that link URLs use a valid protocol. A malicious user with access to the admin interface could thus craft a POST request to publish content with `javascript:` URLs containing arbitrary code. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin.
### Patches
Patched versions have been released as Wagtail 2.11.7 (for the LTS 2.11 branch) and Wagtail 2.12.4 (for the current 2.12 branch).
### Workarounds
For sites that cannot easily upgrade to a current supported version, the vulnerability can be patched by adding the following code to a `wagtail_hooks.py` module in any installed app:
```python
from draftjs_exporter.dom import DOM
from wagtail.admin.rich_text.converters.html_to_contentstate import ExternalLinkElementHandler, PageLinkElementHandler
from wagtail.core import hooks
from wagtail.core.whitelist import check_url
def link_entity(props):
id_ = props.get('id')
link_props = {}
if id_ is not None:
link_props['linktype'] = 'page'
link_props['id'] = id_
else:
link_props['href'] = check_url(props.get('url'))
return DOM.create_element('a', link_props, props['children'])
@hooks.register('register_rich_text_features', order=1)
def register_link(features):
features.register_converter_rule('contentstate', 'link', {
'from_database_format': {
'a[href]': ExternalLinkElementHandler('LINK'),
'a[linktype="page"]': PageLinkElementHandler('LINK'),
},
'to_database_format': {
'entity_decorators': {'LINK': link_entity}
}
})
```
### Acknowledgements
Many thanks to Kevin Breen for reporting this issue.
### For more information
If you have any questions or comments about this advisory:
* Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html)
* Email us at security@wagtail.io (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`) | {'CVE-2021-29434'} | 2022-03-03T05:12:45.312573Z | 2021-04-20T14:02:30Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29434', 'https://github.com/wagtail/wagtail/security/advisories/GHSA-wq5h-f9p5-q7fx', 'https://pypi.org/project/wagtail/'} | null |
PyPI | PYSEC-2021-161 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a division by 0 in `tf.raw_ops.Conv2DBackpropFilter`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/496c2630e51c1a478f095b084329acedb253db6b/tensorflow/core/kernels/conv_grad_shape_utils.cc#L130) does a modulus operation where the divisor is controlled by the caller. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-r4pj-74mg-8868', 'CVE-2021-29524'} | 2021-08-27T03:22:25.604287Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r4pj-74mg-8868', 'https://github.com/tensorflow/tensorflow/commit/fca9874a9b42a2134f907d2fb46ab774a831404a'} | null |
PyPI | PYSEC-2021-474 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger an integer division by zero undefined behavior in `tf.raw_ops.QuantizedBiasAdd`. This is because the implementation of the Eigen kernel(https://github.com/tensorflow/tensorflow/blob/61bca8bd5ba8a68b2d97435ddfafcdf2b85672cd/tensorflow/core/kernels/quantization_utils.h#L812-L849) does a division by the number of elements of the smaller input (based on shape) without checking that this is not zero. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'CVE-2021-29546', 'GHSA-m34j-p8rj-wjxq'} | 2021-12-09T06:34:50.495115Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m34j-p8rj-wjxq', 'https://github.com/tensorflow/tensorflow/commit/67784700869470d65d5f2ef20aeb5e97c31673cb'} | null |
PyPI | PYSEC-2022-168 | null | Pillow before 9.0.1 allows attackers to delete files because spaces in temporary pathnames are mishandled. | {'CVE-2022-24303'} | 2022-03-28T05:28:10.602682Z | 2022-03-28T02:15:00Z | null | null | null | {'https://github.com/python-pillow/Pillow/pull/3450', 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security'} | null |
PyPI | PYSEC-2022-47 | null | OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. In affected versions it is possible to change the username to that of another chat participant with an additional space character at the end of the name string. An adversary with access to the chat environment can use the rename feature to impersonate other participants by adding whitespace characters at the end of the username. | {'CVE-2022-21696', 'GHSA-68vr-8f46-vc9f'} | 2022-03-09T00:16:43.504149Z | 2022-01-18T20:15:00Z | null | null | null | {'https://github.com/onionshare/onionshare/security/advisories/GHSA-68vr-8f46-vc9f', 'https://github.com/onionshare/onionshare/releases/tag/v2.5'} | null |
PyPI | GHSA-xrcv-f9gm-v42c | Out-of-bounds Read in Pillow | path_getbbox in path.c in Pillow before 9.0.0 has a buffer over-read during initialization of ImagePath.Path. | {'CVE-2022-22816'} | 2022-03-03T05:13:32.849115Z | 2022-01-12T20:07:41Z | MODERATE | null | {'CWE-125'} | {'https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html', 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22816', 'https://github.com/python-pillow/Pillow', 'https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331', 'https://www.debian.org/security/2022/dsa-5053'} | null |
PyPI | PYSEC-2019-127 | null | In trytond/model/modelstorage.py in Tryton 4.2 before 4.2.21, 4.4 before 4.4.19, 4.6 before 4.6.14, 4.8 before 4.8.10, and 5.0 before 5.0.6, an authenticated user can order records based on a field for which he has no access right. This may allow the user to guess values. | {'CVE-2019-10868'} | 2020-08-26T12:45:00Z | 2019-04-05T01:29:00Z | null | null | null | {'https://seclists.org/bugtraq/2019/Apr/14', 'https://hg.tryton.org/trytond/rev/f58bbfe0aefb', 'https://www.debian.org/security/2019/dsa-4426', 'https://discuss.tryton.org/t/security-release-for-issue8189/1262'} | null |
PyPI | GHSA-8rm6-75mf-7r7r | Division by zero in TFLite's implementation of hashtable lookup | ### Impact
The TFLite implementation of hashtable lookup is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/1a8e885b864c818198a5b2c0cbbeca5a1e833bc8/tensorflow/lite/kernels/hashtable_lookup.cc#L114-L115):
```cc
const int num_rows = SizeOfDimension(value, 0);
const int row_bytes = value->bytes / num_rows;
```
An attacker can craft a model such that `values`'s first dimension would be 0.
### Patches
We have patched the issue in GitHub commit [5117e0851348065ed59c991562c0ec80d9193db2](https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-29604'} | 2022-03-03T05:12:57.748379Z | 2021-05-21T14:28:19Z | LOW | null | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8rm6-75mf-7r7r', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29604'} | null |
PyPI | GHSA-gvm4-h8j3-rjrq | CHECK-fail in `LoadAndRemapMatrix` | ### Impact
An attacker can cause a denial of service by exploiting a `CHECK`-failure coming from `tf.raw_ops.LoadAndRemapMatrix`:
```python
import tensorflow as tf
ckpt_path = tf.constant([], shape=[0], dtype=tf.string)
old_tensor_name = tf.constant("")
row_remapping = tf.constant([], shape=[0], dtype=tf.int64)
col_remapping = tf.constant([1], shape=[1], dtype=tf.int64)
initializing_values = tf.constant(1.0)
tf.raw_ops.LoadAndRemapMatrix(
ckpt_path=ckpt_path, old_tensor_name=old_tensor_name,
row_remapping=row_remapping, col_remapping=col_remapping,
initializing_values=initializing_values, num_rows=0, num_cols=1)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/d94227d43aa125ad8b54115c03cece54f6a1977b/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L219-L222) assumes that the `ckpt_path` is always a valid scalar.
```cc
const string& ckpt_path = ckpt_path_t->scalar<tstring>()();
```
However, an attacker can send any other tensor as the first argument of `LoadAndRemapMatrix`. This would cause the rank `CHECK` in `scalar<T>()()` to trigger and terminate the process.
### Patches
We have patched the issue in GitHub commit [77dd114513d7796e1e2b8aece214a380af26fbf4](https://github.com/tensorflow/tensorflow/commit/77dd114513d7796e1e2b8aece214a380af26fbf4).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29561'} | 2022-03-03T05:13:13.590105Z | 2021-05-21T14:24:59Z | LOW | null | {'CWE-617'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29561', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gvm4-h8j3-rjrq', 'https://github.com/tensorflow/tensorflow/commit/77dd114513d7796e1e2b8aece214a380af26fbf4'} | null |
PyPI | PYSEC-2017-20 | null | Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | {'CVE-2016-9119'} | 2021-07-05T00:01:23.049637Z | 2017-01-30T22:59:00Z | null | null | null | {'http://www.debian.org/security/2016/dsa-3715', 'http://www.ubuntu.com/usn/USN-3137-1', 'http://www.securityfocus.com/bid/94501', 'https://moinmo.in/SecurityFixes'} | null |
PyPI | GHSA-wh37-37xw-54hr | Improper Authentication in requests-kerberos | python-requests-Kerberos through 0.5 does not handle mutual authentication | {'CVE-2014-8650'} | 2022-03-23T20:45:05.632995Z | 2020-03-10T18:02:31Z | CRITICAL | null | {'CWE-287'} | {'https://github.com/requests/requests-kerberos/blob/0.6/HISTORY.rst', 'https://github.com/mkomitee/requests-kerberos', 'https://github.com/requests/requests-kerberos/issues/35', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-8650', 'http://www.openwall.com/lists/oss-security/2014/11/07/1', 'https://github.com/requests/requests-kerberos/pull/36', 'https://nvd.nist.gov/vuln/detail/CVE-2014-8650', 'https://github.com/mkomitee/requests-kerberos/commit/9c1e08cc17bb6950455a85d33d391ecd2bce6eb6', 'http://www.securityfocus.com/bid/70909', 'https://security-tracker.debian.org/tracker/CVE-2014-8650'} | null |
PyPI | PYSEC-2020-248 | null | Plone before 5.2.3 allows XXE attacks via a feature that is protected by an unapplied permission of plone.schemaeditor.ManageSchemata (therefore, only available to the Manager role). | {'GHSA-2c8c-84w2-j38j', 'CVE-2020-28736'} | 2021-08-27T03:22:11.576448Z | 2020-12-30T19:15:00Z | null | null | null | {'https://github.com/advisories/GHSA-2c8c-84w2-j38j', 'https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt', 'https://www.misakikata.com/codes/plone/python-en.html', 'https://github.com/plone/Products.CMFPlone/issues/3209'} | null |
PyPI | PYSEC-2021-248 | null | TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in `SparseReshape` results in a denial of service based on a `CHECK`-failure. The implementation(https://github.com/tensorflow/tensorflow/blob/e87b51ce05c3eb172065a6ea5f48415854223285/tensorflow/core/kernels/sparse_reshape_op.cc#L40) has no validation that the input arguments specify a valid sparse tensor. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 and TensorFlow 2.3.3, as these are the only affected versions. | {'GHSA-9rpc-5v9q-5r7f', 'CVE-2021-29611'} | 2021-08-27T03:22:41.176381Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9rpc-5v9q-5r7f'} | null |
PyPI | PYSEC-2021-618 | null | TensorFlow is an open source platform for machine learning. In affected versions the implementations for convolution operators trigger a division by 0 if passed empty filter tensor arguments. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {'GHSA-6hpv-v2rx-c5g6', 'CVE-2021-41209'} | 2021-12-09T06:35:08.821435Z | 2021-11-05T22:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6hpv-v2rx-c5g6'} | null |
PyPI | PYSEC-2021-57 | null | An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request. | {'CVE-2021-3197'} | 2021-03-31T14:15:00Z | 2021-02-27T05:15:00Z | null | null | null | {'https://github.com/saltstack/salt/releases', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/', 'https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/', 'https://security.gentoo.org/glsa/202103-01', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/'} | null |
PyPI | PYSEC-2022-113 | null | Tensorflow is an Open Source Machine Learning Framework. The implementation of `MapStage` is vulnerable a `CHECK`-fail if the key tensor is not a scalar. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | {'GHSA-gcvh-66ff-4mwm', 'CVE-2022-21734'} | 2022-03-09T00:18:24.222206Z | 2022-02-03T13:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/map_stage_op.cc#L519-L550', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gcvh-66ff-4mwm', 'https://github.com/tensorflow/tensorflow/commit/f57315566d7094f322b784947093406c2aea0d7d'} | null |
PyPI | GHSA-p737-p57g-4cpr | Insertion of Sensitive Information into Log File in Jupyter notebook | ### Impact
_What kind of vulnerability is it?_
Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter Server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the Jupyter server.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Upgrade to Jupyter Server version 1.15.4
### For more information
If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list [security@ipython.org](mailto:security@ipython.org).
Credit: @3coins for reporting. Thank you!
| {'CVE-2022-24757'} | 2022-03-29T22:02:00.697152Z | 2022-03-25T19:20:39Z | HIGH | null | {'CWE-532'} | {'https://github.com/jupyter-server/jupyter_server', 'https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-p737-p57g-4cpr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24757', 'https://github.com/jupyter-server/jupyter_server/commit/a5683aca0b0e412672ac6218d09f74d44ca0de5a'} | null |
PyPI | GHSA-jwcc-j78w-j73w | High severity vulnerability that affects ansible | Ansible 2.5 prior to 2.5.5, and 2.4 prior to 2.4.5, do not honor the no_log task flag for failed tasks. When the no_log flag has been used to protect sensitive data passed to a task from being logged, and that task does not run successfully, Ansible will expose sensitive data in log files and on the terminal of the user running Ansible. | {'CVE-2018-10855'} | 2022-03-03T05:13:48.507350Z | 2018-10-10T17:23:20Z | HIGH | null | {'CWE-532'} | {'https://access.redhat.com/errata/RHSA-2019:0054', 'https://www.debian.org/security/2019/dsa-4396', 'https://access.redhat.com/errata/RHSA-2018:1949', 'https://nvd.nist.gov/vuln/detail/CVE-2018-10855', 'https://access.redhat.com/errata/RHSA-2018:2585', 'https://access.redhat.com/errata/RHSA-2018:1948', 'https://access.redhat.com/errata/RHSA-2018:2184', 'https://usn.ubuntu.com/4072-1/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10855', 'https://github.com/ansible/ansible', 'https://access.redhat.com/errata/RHSA-2018:2079', 'https://access.redhat.com/errata/RHSA-2018:2022', 'https://github.com/advisories/GHSA-jwcc-j78w-j73w', 'https://access.redhat.com/errata/RHBA-2018:3788'} | null |
PyPI | PYSEC-2018-87 | null | Mercurial version 4.5 and earlier contains a Incorrect Access Control (CWE-285) vulnerability in Protocol server that can result in Unauthorized data access. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in 4.5.1. | {'CVE-2018-1000132'} | 2021-08-27T03:22:07.192158Z | 2018-03-14T13:29:00Z | null | null | null | {'https://access.redhat.com/errata/RHSA-2019:2276', 'https://lists.debian.org/debian-lts-announce/2018/03/msg00034.html', 'https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.5.1_.2F_4.5.2_.282018-03-06.29', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00005.html', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00032.html'} | null |
PyPI | PYSEC-2018-68 | null | An issue was discovered in Project Jupyter JupyterHub OAuthenticator 0.6.x before 0.6.2 and 0.7.x before 0.7.3. When using JupyterHub with GitLab group whitelisting for access control, group membership was not checked correctly, allowing members not in the whitelisted groups to create accounts on the Hub. (Users were not allowed to access other users' accounts, but could create their own accounts on the Hub linked to their GitLab account. GitLab authentication not using gitlab_group_whitelist is unaffected. No other Authenticators are affected.) | {'CVE-2018-7206'} | 2021-08-25T04:30:14.910557Z | 2018-02-18T03:29:00Z | null | null | null | {'https://github.com/jupyterhub/oauthenticator/blob/8499dc2/CHANGELOG.md#073---2018-02-16', 'https://blog.jupyter.org/security-fix-for-jupyterhub-gitlab-oauthenticator-7b14571d1f76', 'https://github.com/jupyterhub/oauthenticator/commit/1845c0e4b1bff3462c91c3108c85205acd3c75a2'} | null |
PyPI | PYSEC-2021-819 | null | TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for `tf.ragged.cross` can trigger a read outside of bounds of heap allocated array. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {'GHSA-fr77-rrx3-cp7g', 'CVE-2021-41212'} | 2021-12-09T06:35:42.944198Z | 2021-11-05T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fr77-rrx3-cp7g'} | null |
PyPI | GHSA-3hq4-f2v6-q338 | Kotti has demonstrated permission change via document view | Kotti before 1.3.2 and 2.x before 2.0.0b2 has CSRF in the local roles implementation, as demonstrated by triggering a permission change via a /admin-document/@@share request. | {'CVE-2018-9856'} | 2022-04-26T18:16:58.659818Z | 2018-07-12T20:30:30Z | HIGH | null | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-9856', 'https://github.com/advisories/GHSA-3hq4-f2v6-q338', 'https://github.com/Kotti/Kotti/issues/551'} | null |
PyPI | PYSEC-2020-233 | null | In freewvs before 0.1.1, a directory structure of more than 1000 nested directories can interrupt a freewvs scan due to Python's recursion limit and os.walk(). This can be problematic in a case where an administrator scans the dirs of potentially untrusted users. This has been patched in 0.1.1. | {'GHSA-7pmh-vrww-25xx', 'CVE-2020-15101'} | 2021-08-27T03:22:04.227798Z | 2020-07-14T22:15:00Z | null | null | null | {'https://github.com/schokokeksorg/freewvs/security/advisories/GHSA-7pmh-vrww-25xx', 'https://github.com/schokokeksorg/freewvs/commit/83a6b55c0435c69f447488b791555e6078803143'} | null |
PyPI | PYSEC-2021-233 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `EmbeddingLookup` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/e4b29809543b250bc9b19678ec4776299dd569ba/tensorflow/lite/kernels/embedding_lookup.cc#L73-L74). An attacker can craft a model such that the first dimension of the `value` input is 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-4vrf-ff7v-hpgr', 'CVE-2021-29596'} | 2021-08-27T03:22:38.479573Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4vrf-ff7v-hpgr', 'https://github.com/tensorflow/tensorflow/commit/f61c57bd425878be108ec787f4d96390579fb83e'} | null |
PyPI | GHSA-5xc6-fpc7-4qvg | High severity vulnerability that affects CoAPthon | The Serialize.deserialize() method in CoAPthon 3.1, 4.0.0, 4.0.1, and 4.0.2 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, CoAP reverse proxy, example collect CoAP server and client) when they receive crafted CoAP messages. | {'CVE-2018-12680'} | 2022-03-03T05:12:43.141511Z | 2019-04-08T15:19:01Z | HIGH | null | {'CWE-502'} | {'https://github.com/Tanganelli/CoAPthon/issues/135', 'https://github.com/Tanganelli/CoAPthon', 'https://github.com/advisories/GHSA-5xc6-fpc7-4qvg', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12680'} | null |
PyPI | PYSEC-2021-663 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow in `QuantizedResizeBilinear` by passing in invalid thresholds for the quantization. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/50711818d2e61ccce012591eeb4fdf93a8496726/tensorflow/core/kernels/quantized_resize_bilinear_op.cc#L705-L706) assumes that the 2 arguments are always valid scalars and tries to access the numeric value directly. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-8c89-2vwr-chcq', 'CVE-2021-29537'} | 2021-12-09T06:35:21.193841Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/f6c40f0c6cbf00d46c7717a26419f2062f2f8694', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8c89-2vwr-chcq'} | null |
PyPI | PYSEC-2021-399 | null | TensorFlow is an open source platform for machine learning. In affected versions the implementation of `ParallelConcat` misses some input validation and can produce a division by 0. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {'GHSA-7v94-64hj-m82h', 'CVE-2021-41207'} | 2021-11-13T06:52:43.264871Z | 2021-11-05T22:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7v94-64hj-m82h', 'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235'} | null |
PyPI | GHSA-h4hv-m4h4-mhwg | Moderate severity vulnerability that affects django | A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability. | {'CVE-2017-7234'} | 2022-03-03T05:12:57.897728Z | 2019-01-04T17:50:17Z | MODERATE | null | {'CWE-601'} | {'http://www.securitytracker.com/id/1038177', 'https://github.com/django/django', 'http://www.debian.org/security/2017/dsa-3835', 'https://github.com/advisories/GHSA-h4hv-m4h4-mhwg', 'https://www.djangoproject.com/weblog/2017/apr/04/security-releases/', 'http://www.securityfocus.com/bid/97401', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7234'} | null |
PyPI | PYSEC-2021-376 | null | python-tuf is a Python reference implementation of The Update Framework (TUF). In both clients (`tuf/client` and `tuf/ngclient`), there is a path traversal vulnerability that in the worst case can overwrite files ending in `.json` anywhere on the client system on a call to `get_one_valid_targetinfo()`. It occurs because the rolename is used to form the filename, and may contain path traversal characters (ie `../../name.json`). The impact is mitigated by a few facts: It only affects implementations that allow arbitrary rolename selection for delegated targets metadata, The attack requires the ability to A) insert new metadata for the path-traversing role and B) get the role delegated by an existing targets metadata, The written file content is heavily restricted since it needs to be a valid, signed targets file. The file extension is always .json. A fix is available in version 0.19 or newer. There are no workarounds that do not require code changes. Clients can restrict the allowed character set for rolenames, or they can store metadata in files named in a way that is not vulnerable: neither of these approaches is possible without modifying python-tuf. | {'CVE-2021-41131', 'GHSA-wjw6-2cqr-j4qr'} | 2021-10-22T22:29:45.339771Z | 2021-10-19T18:15:00Z | null | null | null | {'https://github.com/theupdateframework/python-tuf/issues/1527', 'https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr', 'https://github.com/theupdateframework/python-tuf/commit/4ad7ae48fda594b640139c3b7eae21ed5155a102'} | null |
PyPI | PYSEC-2013-18 | null | The authentication framework (django.contrib.auth) in Django 1.4.x before 1.4.8, 1.5.x before 1.5.4, and 1.6.x before 1.6 beta 4 allows remote attackers to cause a denial of service (CPU consumption) via a long password which is then hashed. | {'CVE-2013-1443'} | 2021-07-15T02:22:08.840916Z | 2013-09-23T20:55:00Z | null | null | null | {'http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html', 'https://www.djangoproject.com/weblog/2013/sep/15/security/', 'http://python.6.x6.nabble.com/Set-a-reasonable-upper-bound-on-password-length-td5032218.html', 'http://lists.opensuse.org/opensuse-updates/2013-11/msg00035.html', 'http://www.debian.org/security/2013/dsa-2758'} | null |
PyPI | GHSA-fvxv-9xxr-h7wj | Moderate severity vulnerability that affects pyspark | When using PySpark , it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application. This affects versions 1.x, 2.0.x, 2.1.x, 2.2.0 to 2.2.2, and 2.3.0 to 2.3.1. | {'CVE-2018-11760'} | 2022-03-03T05:12:10.475321Z | 2019-02-07T18:02:21Z | MODERATE | null | null | {'http://www.securityfocus.com/bid/106786', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11760', 'https://lists.apache.org/thread.html/6d015e56b3a3da968f86e0b6acc69f17ecc16b499389e12d8255bf6e@%3Ccommits.spark.apache.org%3E', 'https://lists.apache.org/thread.html/a86ee93d07b6f61b82b61a28049aed311f5cc9420d26cc95f1a9de7b@%3Cuser.spark.apache.org%3E', 'https://github.com/advisories/GHSA-fvxv-9xxr-h7wj'} | null |
PyPI | PYSEC-2021-726 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `OneHot` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/f61c57bd425878be108ec787f4d96390579fb83e/tensorflow/lite/kernels/one_hot.cc#L68-L72). An attacker can craft a model such that at least one of the dimensions of `indices` would be 0. In turn, the `prefix_dim_size` value would become 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-j8qh-3xrq-c825', 'CVE-2021-29600'} | 2021-12-09T06:35:32.041975Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/3ebedd7e345453d68e279cfc3e4072648e5e12e5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8qh-3xrq-c825'} | null |
PyPI | PYSEC-2020-56 | null | An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times. | {'CVE-2020-12692'} | 2020-09-02T16:15:00Z | 2020-05-07T00:15:00Z | null | null | null | {'https://www.openwall.com/lists/oss-security/2020/05/06/4', 'https://bugs.launchpad.net/keystone/+bug/1872737', 'https://usn.ubuntu.com/4480-1/', 'http://www.openwall.com/lists/oss-security/2020/05/07/1', 'https://security.openstack.org/ossa/OSSA-2020-003.html'} | null |
PyPI | GHSA-4rcq-jv2f-898j | Incorrect Provision of Specified Functionality in qutebrowser | # Description
After a certificate error was overridden by the user, qutebrowser displays the URL as yellow (`colors.statusbar.url.warn.fg`). However, when the affected website was subsequently loaded again, the URL was mistakenly displayed as green (`colors.statusbar.url.success_https`). While the user already has seen a certificate error prompt at this point (or set `content.ssl_strict` to `false` which is not recommended), this could still provide a false sense of security.
# Affected versions and patches
All versions of qutebrowser are believed to be affected, though versions before v0.11.x couldn't be tested.
The issue is fixed in qutebrowser v1.11.1 (pending release) and v1.12.0 (unreleased). Backported patches for older versions are available, but no further releases are planned.
# Mitigation
If you are unable to upgrade:
- Treat any host with a certificate exception as insecure, ignoring the URL color
- Or set `content.ssl_strict` to `True` (instead of `'ask'`), preventing certificate exceptions
# References
- qutebrowser issue: https://github.com/qutebrowser/qutebrowser/issues/5403
- Fix (master branch): https://github.com/qutebrowser/qutebrowser/commit/021ab572a319ca3db5907a33a59774f502b3b975
- Related issue for KDE Falkon: https://bugs.kde.org/show_bug.cgi?id=420902
- Related issue for eric6 Web Browser: https://tracker.die-offenbachs.homelinux.org/eric/issue328 (fixed in eric6 20.6) | {'CVE-2020-11054'} | 2022-03-03T05:13:10.491189Z | 2020-05-08T19:05:05Z | LOW | null | {'CWE-684'} | {'https://github.com/qutebrowser/qutebrowser/commit/f5d801251aa5436aff44660c87d7013e29ac5864', 'https://github.com/qutebrowser/qutebrowser/commit/1b7946ed14b386a24db050f2d6dba81ba6518755', 'https://github.com/qutebrowser/qutebrowser/commit/a45ca9c788f648d10cccce2af41405bf25ee2948', 'https://github.com/qutebrowser/qutebrowser/issues/5403', 'https://tracker.die-offenbachs.homelinux.org/eric/issue328', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11054', 'https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-4rcq-jv2f-898j', 'https://github.com/qutebrowser/qutebrowser/commit/4020210b193f77cf1785b21717f6ef7c5de5f0f8', 'https://github.com/qutebrowser/qutebrowser/commit/6821c236f9ae23adf21d46ce0d56768ac8d0c467', 'https://github.com/qutebrowser/qutebrowser/commit/2281a205c3e70ec20f35ec8fafecee0d5c4f3478', 'https://github.com/qutebrowser/qutebrowser/commit/d28ed758d077a5bf19ddac4da468f7224114df23', 'https://github.com/qutebrowser/qutebrowser/commit/9bd1cf585fccdfe8318fff7af793730e74a04db3', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKAZOOTJ2MBHTYVYQQ52NL53F5CB2XAP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7YWJ5QNHXKTGG5NLV7EGEOKPBVZBA5GS/', 'https://github.com/qutebrowser/qutebrowser/commit/021ab572a319ca3db5907a33a59774f502b3b975', 'https://github.com/qutebrowser/qutebrowser/commit/19f01bb42d02da539446a52a25bb0c1232b86327', 'https://bugs.kde.org/show_bug.cgi?id=420902'} | null |
PyPI | PYSEC-2022-144 | null | Tensorflow is an Open Source Machine Learning Framework. During shape inference, TensorFlow can allocate a large vector based on a value from a tensor controlled by the user. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | {'CVE-2022-23580', 'GHSA-627q-g293-49q7'} | 2022-03-09T00:18:28.435695Z | 2022-02-04T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-627q-g293-49q7', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L788-L790', 'https://github.com/tensorflow/tensorflow/commit/1361fb7e29449629e1df94d44e0427ebec8c83c7'} | null |
PyPI | PYSEC-2021-458 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a null pointer dereference by providing an invalid `permutation` to `tf.raw_ops.SparseMatrixSparseCholesky`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/080f1d9e257589f78b3ffb75debf584168aa6062/tensorflow/core/kernels/sparse/sparse_cholesky_op.cc#L85-L86) fails to properly validate the input arguments. Although `ValidateInputs` is called and there are checks in the body of this function, the code proceeds to the next line in `ValidateInputs` since `OP_REQUIRES`(https://github.com/tensorflow/tensorflow/blob/080f1d9e257589f78b3ffb75debf584168aa6062/tensorflow/core/framework/op_requires.h#L41-L48) is a macro that only exits the current function. Thus, the first validation condition that fails in `ValidateInputs` will cause an early return from that function. However, the caller will continue execution from the next line. The fix is to either explicitly check `context->status()` or to convert `ValidateInputs` to return a `Status`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-xcwj-wfcm-m23c', 'CVE-2021-29530'} | 2021-12-09T06:34:48.047849Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xcwj-wfcm-m23c', 'https://github.com/tensorflow/tensorflow/commit/e6a7c7cc18c3aaad1ae0872cb0a959f5c923d2bd'} | null |
PyPI | GHSA-3pqx-4fqf-j49f | Deserialization of Untrusted Data in PyYAML | PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342. | {'CVE-2019-20477'} | 2022-03-03T05:13:18.732369Z | 2021-04-20T16:40:42Z | HIGH | null | {'CWE-502'} | {'https://www.exploit-db.com/download/47655', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33VBUY73AA6CTTYL3LRWHNFDULV7PFPN/', 'https://github.com/yaml/pyyaml', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/52N5XS73Z5S4ZN7I7R56ICCPCTKCUV4H/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20477', 'https://github.com/yaml/pyyaml/blob/master/CHANGES'} | null |
PyPI | GHSA-337x-4q8g-prc5 | Low severity vulnerability that affects django | In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in django.views.defaults.page_not_found(), leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted URL has malicious content. | {'CVE-2019-3498'} | 2022-03-03T05:14:13.089850Z | 2019-01-14T16:20:05Z | MODERATE | null | {'CWE-20'} | {'https://www.debian.org/security/2019/dsa-4363', 'http://www.securityfocus.com/bid/106453', 'https://github.com/advisories/GHSA-337x-4q8g-prc5', 'https://usn.ubuntu.com/3851-1/', 'https://groups.google.com/forum/#!topic/django-announce/VYU7xQQTEPQ', 'https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html', 'https://www.djangoproject.com/weblog/2019/jan/04/security-releases/', 'https://docs.djangoproject.com/en/dev/releases/security/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3498', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/'} | null |
PyPI | PYSEC-2016-21 | null | python-docx before 0.8.6 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted document. | {'CVE-2016-5851'} | 2021-07-25T23:34:51.683518Z | 2016-12-21T22:59:00Z | null | null | null | {'http://www.securityfocus.com/bid/91485', 'https://github.com/python-openxml/python-docx/blob/v0.8.6/HISTORY.rst', 'http://www.openwall.com/lists/oss-security/2016/06/28/8', 'http://www.openwall.com/lists/oss-security/2016/06/28/7'} | null |
PyPI | GHSA-mp9m-g7qj-6vqr | Unauthorized privilege escalation in Mod module | ### Impact
An unauthorized privilege escalation exploit has been discovered in the Mod module: this exploit allows Discord users with a high privilege level within the guild to bypass hierarchy checks when the application is in a specific condition that is beyond that user's control. By abusing this exploit, it's possible to perform destructive actions within the guild the user has high privileges in.
### Patches
This exploit has been fixed on version & ``3.4.1``.
### Workarounds
Unloading the Mod module with ``unload mod`` __or__, disabling the ``massban`` command with ``command disable global massban`` can render this exploit not accessible. We still highly recommend updating to ``3.4.1`` to completely patch this issue.
### References
* https://github.com/Cog-Creators/Red-DiscordBot/commit/726bfd38adfdfaef760412a68e01447b470f438b
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Cog-Creators/Red-DiscordBot](https://github.com/Cog-Creators/Red-DiscordBot)
* Over on our [Discord server](https://discord.gg/red) | null | 2022-03-03T05:14:17.655531Z | 2020-10-27T20:30:48Z | MODERATE | null | {'CWE-285'} | {'https://github.com/Cog-Creators/Red-DiscordBot/', 'https://github.com/Cog-Creators/Red-DiscordBot/commit/726bfd38adfdfaef760412a68e01447b470f438b', 'https://github.com/Cog-Creators/Red-DiscordBot/releases/tag/3.4.1', 'https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-mp9m-g7qj-6vqr', 'https://pypi.org/project/Red-DiscordBot/'} | null |
PyPI | PYSEC-2022-84 | null | Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCostEstimator::CalculateTensorSize` is vulnerable to an integer overflow if an attacker can create an operation which would involve a tensor with large enough number of elements. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | {'CVE-2022-23575', 'GHSA-c94w-c95p-phf8'} | 2022-03-09T00:17:34.290009Z | 2022-02-04T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c94w-c95p-phf8', 'https://github.com/tensorflow/tensorflow/commit/fcd18ce3101f245b083b30655c27b239dc72221e', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1552-L1558'} | null |
PyPI | GHSA-4q96-6xhq-ff43 | malicious SVG attachment causing stored XSS vulnerability | ### Impact
An attacker with `write` permissions can upload an SVG file that contains malicious javascript. This javascript will be executed in a user's browser when the user is viewing that SVG file on the wiki.
### Patches
Users are strongly advised to upgrade to a patched version.
MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes.
### Workarounds
It is not advised to work around this, but to upgrade MoinMoin to a patched version.
That said, a work around via a Content Security Policy in the web server might be possible.
Also, it is of course helpful if you give `write` permissions (which include uploading attachments) only to trusted users.
### For more information
If you have any questions or comments about this advisory, email me at [twaldmann@thinkmo.de](mailto:twaldmann@thinkmo.de).
### Credits
This vulnerability was discovered by:
Catarina Leite from the Checkmarx SCA AppSec team | {'CVE-2020-15275'} | 2022-03-03T05:12:43.570455Z | 2020-11-11T15:54:41Z | LOW | null | {'CWE-79'} | {'https://pypi.org/project/moin/', 'https://github.com/moinwiki/moin-1.9/releases/tag/1.9.11', 'https://github.com/moinwiki/moin-1.9/security/advisories/GHSA-4q96-6xhq-ff43', 'https://advisory.checkmarx.net/advisory/CX-2020-4285', 'https://github.com/moinwiki/moin-1.9/commit/31de9139d0aabc171e94032168399b4a0b2a88a2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15275'} | null |
PyPI | PYSEC-2021-634 | null | TensorFlow is an open source platform for machine learning. In affected versions TensorFlow's Grappler optimizer has a use of unitialized variable. If the `train_nodes` vector (obtained from the saved model that gets optimized) does not contain a `Dequeue` node, then `dequeue_node` is left unitialized. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {'CVE-2021-41225', 'GHSA-7r94-xv9v-63jw'} | 2021-12-09T06:35:11.117498Z | 2021-11-05T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/68867bf01239d9e1048f98cbad185bf4761bedd3', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7r94-xv9v-63jw'} | null |
PyPI | PYSEC-2021-264 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of `tf.raw_ops.ResourceScatterDiv` is vulnerable to a division by 0 error. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/resource_variable_ops.cc#L865) uses a common class for all binary operations but fails to treat the division by 0 case separately. We have patched the issue in GitHub commit 4aacb30888638da75023e6601149415b39763d76. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'CVE-2021-37642', 'GHSA-ch4f-829c-v5pw'} | 2021-08-27T03:22:43.277267Z | 2021-08-12T18:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-ch4f-829c-v5pw', 'https://github.com/tensorflow/tensorflow/commit/4aacb30888638da75023e6601149415b39763d76'} | null |
PyPI | PYSEC-2020-264 | null | In "I hate money" before version 4.1.5, an authenticated member of one project can modify and delete members of another project, without knowledge of this other project's private code. This can be further exploited to access all bills of another project without knowledge of this other project's private code. With the default configuration, anybody is allowed to create a new project. An attacker can create a new project and then use it to become authenticated and exploit this flaw. As such, the exposure is similar to an unauthenticated attack, because it is trivial to become authenticated. This is fixed in version 4.1.5. | {'CVE-2020-15120', 'GHSA-67j9-c52g-w2q9'} | 2021-11-16T03:58:44.236145Z | 2020-07-27T18:15:00Z | null | null | null | {'https://github.com/spiral-project/ihatemoney/commit/8d77cf5d5646e1d2d8ded13f0660638f57e98471', 'https://github.com/spiral-project/ihatemoney/security/advisories/GHSA-67j9-c52g-w2q9'} | null |
PyPI | GHSA-jqwc-jm56-wcwj | Cross-site scripting in Jupyter Notebook | Jupyter Notebook before 5.5.0 does not use a CSP header to treat served files as belonging to a separate origin. Thus, for example, an XSS payload can be placed in an SVG document. | {'CVE-2018-21030'} | 2022-03-03T05:14:01.909978Z | 2019-11-08T17:07:42Z | MODERATE | null | {'CWE-79'} | {'https://github.com/jupyter/notebook/pull/3341', 'https://nvd.nist.gov/vuln/detail/CVE-2018-21030', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html', 'https://github.com/jupyter/notebook/releases/tag/5.5.0'} | null |
PyPI | GHSA-rwr3-c2q8-gm56 | Moderate severity vulnerability that affects Pillow | Pillow before 3.3.2 allows context-dependent attackers to obtain sensitive information by using the "crafted image file" approach, related to an "Integer Overflow" issue affecting the Image.core.map_buffer in map.c component. | {'CVE-2016-9189'} | 2022-03-03T05:13:34.860527Z | 2018-07-24T20:08:27Z | MODERATE | null | {'CWE-190'} | {'https://github.com/python-pillow/Pillow/', 'https://github.com/python-pillow/Pillow/issues/2105', 'http://www.securityfocus.com/bid/94234', 'https://github.com/advisories/GHSA-rwr3-c2q8-gm56', 'http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html', 'https://security.gentoo.org/glsa/201612-52', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9189', 'http://www.debian.org/security/2016/dsa-3710', 'https://github.com/python-pillow/Pillow/pull/2146/commits/c50ebe6459a131a1ea8ca531f10da616d3ceaa0f'} | null |
PyPI | PYSEC-2019-222 | null | Invalid memory access and/or a heap buffer overflow in the TensorFlow XLA compiler in Google TensorFlow before 1.7.1 could cause a crash or read from other parts of process memory via a crafted configuration file. | {'CVE-2018-10055'} | 2021-08-27T03:22:22.150023Z | 2019-04-24T17:29:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-006.md'} | null |
PyPI | PYSEC-2020-321 | null | In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, changing the TensorFlow's `SavedModel` protocol buffer and altering the name of required keys results in segfaults and data corruption while loading the model. This can cause a denial of service in products using `tensorflow-serving` or other inference-as-a-service installments. Fixed were added in commits f760f88b4267d981e13f4b302c437ae800445968 and fcfef195637c6e365577829c4d67681695956e7d (both going into TensorFlow 2.2.0 and 2.3.0 but not yet backported to earlier versions). However, this was not enough, as #41097 reports a different failure mode. The issue is patched in commit adf095206f25471e864a8e63a0f1caef53a0e3a6, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. | {'CVE-2020-15206', 'GHSA-w5gh-2wr2-pm6g'} | 2021-12-09T06:35:14.366685Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w5gh-2wr2-pm6g', 'https://github.com/tensorflow/tensorflow/commit/adf095206f25471e864a8e63a0f1caef53a0e3a6', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'} | null |
PyPI | PYSEC-2015-31 | null | The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144. | {'CVE-2015-1852'} | 2021-07-25T23:34:52.173858Z | 2015-04-17T17:59:00Z | null | null | null | {'http://www.securityfocus.com/bid/74187', 'http://lists.openstack.org/pipermail/openstack-announce/2015-April/000350.html', 'https://bugs.launchpad.net/keystonemiddleware/+bug/1411063', 'http://www.ubuntu.com/usn/USN-2705-1', 'http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html', 'http://rhn.redhat.com/errata/RHSA-2015-1685.html', 'http://rhn.redhat.com/errata/RHSA-2015-1677.html'} | null |
PyPI | PYSEC-2021-771 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause a floating point exception by calling inplace operations with crafted arguments that would result in a division by 0. The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/inplace_ops.cc#L283) has a logic error: it should skip processing if `x` and `v` are empty but the code uses `||` instead of `&&`. We have patched the issue in GitHub commit e86605c0a336c088b638da02135ea6f9f6753618. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'GHSA-cm5x-837x-jf3c', 'CVE-2021-37660'} | 2021-12-09T06:35:37.526889Z | 2021-08-12T18:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cm5x-837x-jf3c'} | null |
PyPI | PYSEC-2021-94 | null | An issue was discovered in Pillow before 8.2.0. For BLP data, BlpImagePlugin did not properly check that reads (after jumping to file offsets) returned data. This could lead to a DoS where the decoder could be run a large number of times on empty data. | {'GHSA-hjfx-8p6c-g7gx', 'CVE-2021-28678'} | 2021-06-09T05:01:24.292350Z | 2021-06-02T16:15:00Z | null | null | null | {'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28678-fix-blp-dos', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/', 'https://github.com/advisories/GHSA-hjfx-8p6c-g7gx', 'https://github.com/python-pillow/Pillow/pull/5377'} | null |
PyPI | PYSEC-2019-12 | null | An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities. | {'GHSA-h5jv-4p7w-64jg', 'CVE-2019-14233'} | 2020-08-24T17:37:00Z | 2019-08-02T15:15:00Z | null | null | null | {'https://seclists.org/bugtraq/2019/Aug/15', 'https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs', 'https://www.debian.org/security/2019/dsa-4498', 'https://security.netapp.com/advisory/ntap-20190828-0002/', 'https://security.gentoo.org/glsa/202004-17', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/', 'https://docs.djangoproject.com/en/dev/releases/security/', 'https://github.com/advisories/GHSA-h5jv-4p7w-64jg', 'https://www.djangoproject.com/weblog/2019/aug/01/security-releases/'} | null |
PyPI | PYSEC-2021-321 | null | Wasmtime is an open source runtime for WebAssembly & WASI. In Wasmtime from version 0.26.0 and before version 0.30.0 is affected by a memory unsoundness vulnerability. There was an invalid free and out-of-bounds read and write bug when running Wasm that uses `externref`s in Wasmtime. To trigger this bug, Wasmtime needs to be running Wasm that uses `externref`s, the host creates non-null `externrefs`, Wasmtime performs a garbage collection (GC), and there has to be a Wasm frame on the stack that is at a GC safepoint where there are no live references at this safepoint, and there is a safepoint with live references earlier in this frame's function. Under this scenario, Wasmtime would incorrectly use the GC stack map for the safepoint from earlier in the function instead of the empty safepoint. This would result in Wasmtime treating arbitrary stack slots as `externref`s that needed to be rooted for GC. At the *next* GC, it would be determined that nothing was referencing these bogus `externref`s (because nothing could ever reference them, because they are not really `externref`s) and then Wasmtime would deallocate them and run `<ExternRef as Drop>::drop` on them. This results in a free of memory that is not necessarily on the heap (and shouldn't be freed at this moment even if it was), as well as potential out-of-bounds reads and writes. Even though support for `externref`s (via the reference types proposal) is enabled by default, unless you are creating non-null `externref`s in your host code or explicitly triggering GCs, you cannot be affected by this bug. We have reason to believe that the effective impact of this bug is relatively small because usage of `externref` is currently quite rare. This bug has been patched and users should upgrade to Wasmtime version 0.30.0. If you cannot upgrade Wasmtime at this time, you can avoid this bug by disabling the reference types proposal by passing `false` to `wasmtime::Config::wasm_reference_types`. | {'GHSA-4873-36h9-wv49', 'CVE-2021-39218'} | 2021-09-17T22:30:49.898970Z | 2021-09-17T21:15:00Z | null | null | null | {'https://crates.io/crates/wasmtime', 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-4873-36h9-wv49', 'https://github.com/bytecodealliance/wasmtime/commit/398a73f0dd862dbe703212ebae8e34036a18c11c'} | null |
PyPI | PYSEC-2022-152 | null | Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that Grappler optimizer would attempt to build a tensor using a reference `dtype`. This would result in a crash due to a `CHECK`-fail in the `Tensor` constructor as reference types are not allowed. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | {'GHSA-fx5c-h9f6-rv7c', 'CVE-2022-23588'} | 2022-03-09T00:18:29.595866Z | 2022-02-04T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fx5c-h9f6-rv7c', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/tensor.cc#L733-L781', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L1328-L1402', 'https://github.com/tensorflow/tensorflow/commit/6b5adc0877de832b2a7c189532dbbbc64622eeb6'} | null |
PyPI | PYSEC-2012-8 | null | Python Keyring 0.9.1 does not securely initialize the cipher when encrypting passwords for CryptedFileKeyring files, which makes it easier for local users to obtain passwords via a brute-force attack. | {'CVE-2012-4571'} | 2021-07-15T02:22:15.253541Z | 2012-11-30T22:55:00Z | null | null | null | {'https://bugs.launchpad.net/ubuntu/+source/python-keyring/+bug/1004845', 'http://www.ubuntu.com/usn/USN-1634-1', 'http://www.openwall.com/lists/oss-security/2012/10/31/8', 'http://pypi.python.org/pypi/keyring'} | null |
PyPI | GHSA-gjqc-q9g6-q2j3 | `CHECK`-failures in binary ops in Tensorflow | ### Impact
A malicious user can cause a denial of service by altering a `SavedModel` such that [any binary op](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/cwise_ops_common.h#L88-L137) would trigger `CHECK` failures. This occurs when the protobuf part corresponding to the tensor arguments is modified such that the `dtype` no longer matches the `dtype` expected by the op. In that case, calling the templated binary operator for the binary op would receive corrupted data, due to the type confusion involved:
```cc
functor::BinaryFunctor<Device, Functor, 1>()(
eigen_device, out->template flat<Tout>(),
input_0.template flat<Tin>(), input_1.template flat<Tin>(),
error_ptr);
```
If `Tin` and `Tout` don't match the type of data in `out` and `input_*` tensors then `flat<*>` would interpret it wrongly. In most cases, this would be a silent failure, but we have noticed scenarios where this results in a `CHECK` crash, hence a denial of service.
### Patches
We have patched the issue in GitHub commit [a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9](https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2022-23583'} | 2022-03-03T05:13:44.768574Z | 2022-02-10T00:34:13Z | MODERATE | null | {'CWE-617'} | {'https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gjqc-q9g6-q2j3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23583', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/cwise_ops_common.h#L88-L137', 'https://github.com/tensorflow/tensorflow/'} | null |
PyPI | GHSA-mq5p-2mcr-m52j | Code injection in nbgitpuller | ### Impact
Due to an unsanitized input, visiting maliciously crafted links could result in arbitrary code execution in the user environment.
### Patches
0.10.2
### Workarounds
None, other than upgrade to 0.10.2 or downgrade to 0.8.x.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [nbgitpuller](https://github.com/jupyterhub/nbgitpuller/issues)
* Email our security team at [security@ipython.org](mailto:security@ipython.org)
| {'CVE-2021-39160'} | 2022-03-22T21:32:03.613306Z | 2021-08-30T16:17:06Z | CRITICAL | null | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-39160', 'https://github.com/jupyterhub/nbgitpuller/security/advisories/GHSA-mq5p-2mcr-m52j', 'https://github.com/jupyterhub/nbgitpuller', 'https://github.com/jupyterhub/nbgitpuller/commit/07690644f29a566011dd0d7ba14cae3eb0490481', 'https://github.com/jupyterhub/nbgitpuller/blob/main/CHANGELOG.md#0102---2021-08-25'} | null |
PyPI | PYSEC-2020-40 | null | An issue was discovered in drf-jwt 1.15.x before 1.15.1. It allows attackers with access to a notionally invalidated token to obtain a new, working token via the refresh endpoint, because the blacklist protection mechanism is incompatible with the token-refresh feature. NOTE: drf-jwt is a fork of jpadilla/django-rest-framework-jwt, which is unmaintained. | {'CVE-2020-10594', 'GHSA-fpjm-rp2g-3r4c'} | 2020-03-19T17:38:00Z | 2020-03-15T22:15:00Z | null | null | null | {'https://github.com/jpadilla/django-rest-framework-jwt/issues/484', 'https://github.com/advisories/GHSA-fpjm-rp2g-3r4c', 'https://pypi.org/project/drf-jwt/1.15.1/#history', 'https://github.com/Styria-Digital/django-rest-framework-jwt/issues/36'} | null |
PyPI | GHSA-rg3m-hqc5-344v | `SparseFillEmptyRows` heap OOB | ### Impact
The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L194-L241) of `SparseFillEmptyRows` can be made to trigger a heap OOB access:
```python
import tensorflow as tf
data=tf.raw_ops.SparseFillEmptyRows(
indices=[[0,0],[0,0],[0,0]],
values=['sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss'],
dense_shape=[5,3],
default_value='o')
```
This occurs whenever the size of `indices` does not match the size of `values`.
### Patches
We have patched the issue in GitHub commit [67bfd9feeecfb3c61d80f0e46d89c170fbee682b](https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-41224'} | 2022-03-03T05:12:57.990913Z | 2021-11-10T18:45:55Z | HIGH | null | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41224', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rg3m-hqc5-344v', 'https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b'} | null |
PyPI | PYSEC-2022-92 | null | Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that any binary op would trigger `CHECK` failures. This occurs when the protobuf part corresponding to the tensor arguments is modified such that the `dtype` no longer matches the `dtype` expected by the op. In that case, calling the templated binary operator for the binary op would receive corrupted data, due to the type confusion involved. If `Tin` and `Tout` don't match the type of data in `out` and `input_*` tensors then `flat<*>` would interpret it wrongly. In most cases, this would be a silent failure, but we have noticed scenarios where this results in a `CHECK` crash, hence a denial of service. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | {'CVE-2022-23583', 'GHSA-gjqc-q9g6-q2j3'} | 2022-03-09T00:17:35.311751Z | 2022-02-04T23:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gjqc-q9g6-q2j3', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/cwise_ops_common.h#L88-L137', 'https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9'} | null |
PyPI | PYSEC-2018-29 | null | Directory Traversal vulnerability in salt-api in SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allows remote attackers to determine which files exist on the server. | {'CVE-2018-15750'} | 2021-06-16T00:03:24.871222Z | 2018-10-24T22:29:00Z | null | null | null | {'https://lists.debian.org/debian-lts-announce/2020/07/msg00024.html', 'https://docs.saltstack.com/en/latest/topics/releases/2018.3.3.html', 'https://docs.saltstack.com/en/2017.7/topics/releases/2017.7.8.html', 'https://groups.google.com/d/msg/salt-users/dimVF7rpphY/jn3Xv3MbBQAJ', 'https://groups.google.com/d/msg/salt-users/L9xqcJ0UXxs/qgDj42obBQAJ', 'https://usn.ubuntu.com/4459-1/', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html'} | null |
PyPI | PYSEC-2021-858 | null | This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigger a stored command injection vulnerability and potentially gain further access to the system. | {'GHSA-q4xr-rc97-m4xx', 'SNYK-PYTHON-CELERY-2314953', 'CVE-2021-23727'} | 2021-12-29T19:23:51.138646Z | 2021-12-29T17:15:00Z | null | null | null | {'https://github.com/advisories/GHSA-q4xr-rc97-m4xx', 'https://snyk.io/vuln/SNYK-PYTHON-CELERY-2314953', 'https://github.com/celery/celery/blob/master/Changelog.rst%23522'} | null |
PyPI | GHSA-hggv-mcp4-vxc5 | Improper Authentication in FreeTAKServer | FreeTAKServer is an open source, lightweight Server for connect TAK clients. An access control issue in the component /ManageRoute/postRoute of FreeTAKServer version 1.9.8 allows unauthenticated attackers to cause a Denial of Service (DoS) via an unusually large amount of created routes, or create unsafe or false routes for legitimate users. There is currently no known workaround. This issue was fixed in version 1.9.8.5. | {'CVE-2022-25508'} | 2022-03-25T00:04:22.281015Z | 2022-03-12T00:00:37Z | HIGH | null | {'CWE-400', 'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-25508', 'https://github.com/FreeTAKTeam/FreeTakServer/issues/291', 'https://github.com/FreeTAKTeam/FreeTakServer'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.