ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
PyPI | PYSEC-2020-118 | null | In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the implementation of `SparseFillEmptyRowsGrad` uses a double indexing pattern. It is possible for `reverse_index_map(i)` to be an index outside of bounds of `grad_values`, thus resulting in a heap buffer overflow. The issue is patched in commit 390611e0d45c5793c7066110af37c8514e6a6c54, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. | {'GHSA-63xm-rx5p-xvqr', 'CVE-2020-15195'} | 2020-10-29T16:15:00Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr'} | null |
PyPI | PYSEC-2018-85 | null | python-kdcproxy before 0.3.2 allows remote attackers to cause a denial of service via a large POST request. | {'CVE-2015-5159', 'GHSA-j7c4-2xj8-wm7r'} | 2021-08-27T03:22:05.569463Z | 2018-10-30T18:29:00Z | null | null | null | {'https://github.com/latchset/kdcproxy/commit/f274aa6787cb8b3ec1cc12c440a56665b7231882', 'https://github.com/advisories/GHSA-j7c4-2xj8-wm7r', 'https://bugzilla.redhat.com/show_bug.cgi?id=1245200'} | null |
PyPI | PYSEC-2009-9 | null | Zope Object Database (ZODB) before 3.8.2, when certain Zope Enterprise Objects (ZEO) database sharing is enabled, allows remote attackers to bypass authentication via vectors involving the ZEO network protocol. | {'CVE-2009-0669'} | 2021-07-16T01:31:36.719288Z | 2009-08-07T19:30:00Z | null | null | null | {'https://exchange.xforce.ibmcloud.com/vulnerabilities/52379', 'http://pypi.python.org/pypi/ZODB3/3.8.2#whats-new-in-zodb-3-8-2', 'http://www.vupen.com/english/advisories/2009/2217', 'http://www.securityfocus.com/bid/35987', 'http://osvdb.org/56826', 'http://mail.zope.org/pipermail/zope-announce/2009-August/002220.html', 'http://secunia.com/advisories/36204', 'http://secunia.com/advisories/36205'} | null |
PyPI | GHSA-m3jw-62m7-jjcm | Out-of-bounds read in typed-ast and cpython may allow an attacker to crash the interpreter process (handle_keywordonly_args case). | typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.) | {'CVE-2019-19274'} | 2022-03-03T05:13:58.719975Z | 2019-12-02T18:02:02Z | HIGH | null | {'CWE-125'} | {'https://github.com/python/typed_ast/commit/156afcb26c198e162504a57caddfe0acd9ed7dce', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5H4Q6LFVRX7SFXLBEJMNQFI4T5SCEA/', 'https://bugs.python.org/issue36495', 'https://github.com/python/typed_ast/commit/dc317ac9cff859aa84eeabe03fb5004982545b3b', 'https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19274', 'https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e'} | null |
PyPI | GHSA-q3g3-h9r4-prrc | Reference binding to nullptr and heap OOB in binary cwise ops | ### Impact
An attacker can cause undefined behavior via binding a reference to null pointer in all binary cwise operations that don't require broadcasting (e.g., gradients of binary cwise operations):
```python
import tensorflow as tf
tf.raw_ops.SqrtGrad(y=[4, 16],dy=[])
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/cwise_ops_common.h#L264) assumes that the two inputs have exactly the same number of elements but does not check that. Hence, when the eigen functor executes it triggers heap OOB reads and undefined behavior due to binding to nullptr.
### Patches
We have patched the issue in GitHub commit [93f428fd1768df147171ed674fee1fc5ab8309ec](https://github.com/tensorflow/tensorflow/commit/93f428fd1768df147171ed674fee1fc5ab8309ec).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37659'} | 2022-03-03T05:13:43.553860Z | 2021-08-25T14:42:47Z | HIGH | null | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q3g3-h9r4-prrc', 'https://github.com/tensorflow/tensorflow/commit/93f428fd1768df147171ed674fee1fc5ab8309ec', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37659'} | null |
PyPI | PYSEC-2022-111 | null | Tensorflow is an Open Source Machine Learning Framework. The implementation of `ThreadPoolHandle` can be used to trigger a denial of service attack by allocating too much memory. This is because the `num_threads` argument is only checked to not be negative, but there is no upper bound on its value. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | {'GHSA-c582-c96p-r5cq', 'CVE-2022-21732'} | 2022-03-09T00:18:23.954976Z | 2022-02-03T12:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/experimental/threadpool_dataset_op.cc#L79-L135', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c582-c96p-r5cq', 'https://github.com/tensorflow/tensorflow/commit/e3749a6d5d1e8d11806d4a2e9cc3123d1a90b75e'} | null |
PyPI | GHSA-h65g-jfqg-2w6m | Server-Side Request Forgery in calibreweb | calibreweb prior to version 0.6.17 is vulnerable to server-side request forgery (SSRF). This is a result of incomplete SSRF protection that can be bypassed via an HTTP redirect. An HTTP server set up to respond with a 302 redirect may redirect a request to `localhost`. | {'CVE-2022-0767'} | 2022-03-15T22:00:10.899967Z | 2022-03-08T00:00:31Z | CRITICAL | null | {'CWE-918'} | {'https://huntr.dev/bounties/b26fc127-9b6a-4be7-a455-58aefbb62d9e', 'https://github.com/janeczku/calibre-web', 'https://github.com/janeczku/calibre-web/commit/965352c8d96c9eae7a6867ff76b0db137d04b0b8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0767'} | null |
PyPI | GHSA-g6rj-rv7j-xwp4 | Denial of service | An issue was discovered in Pillow before 8.2.0. PSDImagePlugin.PsdImageFile lacked a sanity check on the number of input layers relative to the size of the data block. This could lead to a DoS on Image.open prior to Image.load. | {'CVE-2021-28675'} | 2022-03-03T05:13:18.742311Z | 2021-06-08T18:49:11Z | MODERATE | null | {'CWE-252', 'CWE-233'} | {'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28675-fix-dos-in-psdimageplugin', 'https://github.com/python-pillow/Pillow/pull/5377/commits/22e9bee4ef225c0edbb9323f94c26cee0c623497', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28675', 'https://security.gentoo.org/glsa/202107-33', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/'} | null |
PyPI | PYSEC-2021-55 | null | An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py. | {'CVE-2021-3148'} | 2021-03-31T14:15:00Z | 2021-02-27T05:15:00Z | null | null | null | {'https://github.com/saltstack/salt/releases', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YOGNT2XWPOYV7YT75DN7PS4GIYWFKOK5/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUGLOJ6NXLCIFRD2JTXBYQEMAEF2B6XH/', 'https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/', 'https://security.gentoo.org/glsa/202103-01', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7GRVZ5WAEI3XFN2BDTL6DDXFS5HYSDVB/'} | null |
PyPI | GHSA-r854-96gq-rfg3 | Python Image Library (PIL) allows symlink attacks | The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes. | {'CVE-2014-1933'} | 2022-03-03T05:13:05.290482Z | 2020-05-18T17:41:19Z | MODERATE | null | null | {'https://github.com/python-imaging/Pillow/commit/4e9f367dfd3f04c8f5d23f7f759ec12782e10ee7', 'http://www.ubuntu.com/usn/USN-2168-1', 'http://lists.opensuse.org/opensuse-updates/2014-05/msg00002.html', 'https://security.gentoo.org/glsa/201612-52', 'https://github.com/python-imaging/Pillow', 'http://www.openwall.com/lists/oss-security/2014/02/10/15', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1933', 'http://www.openwall.com/lists/oss-security/2014/02/11/1', 'http://www.securityfocus.com/bid/65513'} | null |
PyPI | GHSA-2c8c-84w2-j38j | Improper Restriction of XML External Entity Reference in Plone | Plone before 5.2.3 allows XXE attacks via a feature that is protected by an unapplied permission of plone.schemaeditor.ManageSchemata (therefore, only available to the Manager role). | {'CVE-2020-28736'} | 2022-03-03T05:14:18.418377Z | 2021-04-07T21:14:00Z | HIGH | null | {'CWE-611'} | {'https://github.com/plone/Products.CMFPlone/issues/3209', 'https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt', 'https://www.misakikata.com/codes/plone/python-en.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28736'} | null |
PyPI | GHSA-wfjw-w6pv-8p7f | Observable Response Discrepancy in Flask-AppBuilder | ### Impact
User enumeration in database authentication in Flask-AppBuilder < 3.4.4. Allows for a non authenticated user to enumerate existing accounts by timing the response time from the server when you are logging in.
### Patches
Upgrade to 3.4.4
### Workarounds
### References
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [example link to repo](http://example.com)
* Email us at [example email address](mailto:example@example.com)
| {'CVE-2022-21659'} | 2022-03-03T05:13:20.474273Z | 2022-02-01T00:47:53Z | MODERATE | null | {'CWE-203'} | {'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-wfjw-w6pv-8p7f', 'https://github.com/dpgaspar/Flask-AppBuilder/pull/1775', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21659', 'https://github.com/dpgaspar/Flask-AppBuilder'} | null |
PyPI | PYSEC-2017-22 | null | An exploitable vulnerability exists in the YAML loading functionality of util.py in OwlMixin before 2.0.0a12. A "Load YAML" string or file (aka load_yaml or load_yamlf) can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability. | {'CVE-2017-16618', 'GHSA-ccmq-qvcp-5mrm'} | 2021-07-05T00:01:23.384346Z | 2017-11-08T03:29:00Z | null | null | null | {'https://github.com/advisories/GHSA-ccmq-qvcp-5mrm', 'https://joel-malwarebenchmark.github.io/blog/2017/11/08/cve-2017-16618-convert-through-owlmixin/', 'https://github.com/tadashi-aikawa/owlmixin/issues/12', 'https://github.com/tadashi-aikawa/owlmixin/commit/5d0575303f6df869a515ced4285f24ba721e0d4e'} | null |
PyPI | GHSA-49rx-x2rw-pc6f | Heap OOB read in all `tf.raw_ops.QuantizeAndDequantizeV*` ops | ### Impact
The [shape inference functions for the `QuantizeAndDequantizeV*` operations](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/array_ops.cc) can trigger a read outside of bounds of heap allocated array as illustrated in the following sets of PoCs:
```python
import tensorflow as tf
@tf.function
def test():
data=tf.raw_ops.QuantizeAndDequantizeV4Grad(
gradients=[1.0,1.0],
input=[1.0,1.0],
input_min=[1.0,10.0],
input_max=[1.0,10.0],
axis=-100)
return data
test()
```
```python
import tensorflow as tf
@tf.function
def test():
data=tf.raw_ops.QuantizeAndDequantizeV4(
input=[1.0,1.0],
input_min=[1.0,10.0],
input_max=[1.0,10.0],
signed_input=False,
num_bits=10,
range_given=False,
round_mode='HALF_TO_EVEN',
narrow_range=False,
axis=-100)
return data
test()
```
```python
import tensorflow as tf
@tf.function
def test():
data=tf.raw_ops.QuantizeAndDequantizeV3(
input=[1.0,1.0],
input_min=[1.0,10.0],
input_max=[1.0,10.0],
signed_input=False,
num_bits=10,
range_given=False,
narrow_range=False,
axis=-100)
return data
test()
```
```python
import tensorflow as tf
@tf.function
def test():
data=tf.raw_ops.QuantizeAndDequantizeV2(
input=[1.0,1.0],
input_min=[1.0,10.0],
input_max=[1.0,10.0],
signed_input=False,
num_bits=10,
range_given=False,
round_mode='HALF_TO_EVEN',
narrow_range=False,
axis=-100)
return data
test()
```
In all of these cases, `axis` is a negative value different than the special value used for optional/unknown dimensions (i.e., -1). However, the code ignores the occurences of these values:
```cc
...
if (axis != -1) {
...
c->Dim(input, axis);
...
}
```
### Patches
We have patched the issue in GitHub commit [7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d](https://github.com/tensorflow/tensorflow/commit/7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
| {'CVE-2021-41205'} | 2022-03-03T05:14:08.515949Z | 2021-11-10T19:04:25Z | HIGH | null | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/commit/7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41205', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-49rx-x2rw-pc6f'} | null |
PyPI | GHSA-5xwc-mrhx-5g3m | Reference binding to nullptr in `MatrixDiagV*` ops | ### Impact
An attacker can cause undefined behavior via binding a reference to null pointer in all operations of type `tf.raw_ops.MatrixDiagV*`:
```python
import tensorflow as tf
tf.raw_ops.MatrixDiagV3(
diagonal=[1,0],
k=[],
num_rows=[1,2,3],
num_cols=[4,5],
padding_value=[],
align='RIGHT_RIGHT')
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/linalg/matrix_diag_op.cc) has incomplete validation that the value of `k` is a valid tensor. We have check that this value is either a scalar or a vector, but there is no check for the number of elements. If this is an empty tensor, then code that accesses the first element of the tensor is wrong:
```cc
auto& diag_index = context->input(1);
...
lower_diag_index = diag_index.flat<int32>()(0);
```
### Patches
We have patched the issue in GitHub commit [f2a673bd34f0d64b8e40a551ac78989d16daad09](https://github.com/tensorflow/tensorflow/commit/f2a673bd34f0d64b8e40a551ac78989d16daad09).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37657'} | 2022-03-03T05:12:52.150970Z | 2021-08-25T14:42:52Z | HIGH | null | {'CWE-824'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5xwc-mrhx-5g3m', 'https://github.com/tensorflow/tensorflow', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37657', 'https://github.com/tensorflow/tensorflow/commit/f2a673bd34f0d64b8e40a551ac78989d16daad09'} | null |
PyPI | GHSA-vc29-rj92-gc7j | Out-of-bounds Write in OpenCV | OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an out-of-bounds write error in the function FillColorRow4 in utils.cpp when reading an image file by using cv::imread. | {'CVE-2017-12606'} | 2022-03-03T05:13:49.460092Z | 2021-10-12T22:02:12Z | HIGH | null | {'CWE-787'} | {'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/issues/9309', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://security.gentoo.org/glsa/201712-02', 'https://github.com/xiaoqx/pocs/blob/master/opencv.md', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12606', 'https://github.com/opencv/opencv/pull/9376', 'https://github.com/opencv/opencv-python'} | null |
PyPI | PYSEC-2022-45 | null | OnionShare is an open source tool that lets you securely and anonymously share files, host websites, and chat with friends using the Tor network. The website mode of the onionshare allows to use a hardened CSP, which will block any scripts and external resources. It is not possible to configure this CSP for individual pages and therefore the security enhancement cannot be used for websites using javascript or external resources like fonts or images. | {'CVE-2022-21694', 'GHSA-h29c-wcm8-883h'} | 2022-03-09T00:16:43.398323Z | 2022-01-18T23:15:00Z | null | null | null | {'https://github.com/onionshare/onionshare/security/advisories/GHSA-h29c-wcm8-883h', 'https://github.com/onionshare/onionshare/issues/1389', 'https://github.com/onionshare/onionshare/releases/tag/v2.5'} | null |
PyPI | PYSEC-2020-78 | null | In Pillow before 7.1.0, there are two Buffer Overflows in libImaging/TiffDecode.c. | null | 2020-07-27T19:15:00Z | 2020-06-25T19:15:00Z | null | null | null | {'https://github.com/python-pillow/Pillow/commits/master/src/libImaging', 'https://github.com/python-pillow/Pillow#diff-9478f2787e3ae9668a15123b165c23ac/commit/46f4a349b88915787fea3fb91348bb1665831bbb', 'https://github.com/python-pillow/Pillow/pull/4538', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/', 'https://github.com/python-pillow/Pillow/commit/46f4a349b88915787fea3fb91348bb1665831bbb#diff-9478f2787e3ae9668a15123b165c23ac', 'https://usn.ubuntu.com/4430-2/', 'https://pillow.readthedocs.io/en/stable/releasenotes/7.1.0.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427/'} | null |
PyPI | GHSA-68vr-8f46-vc9f | Username spoofing in OnionShare | Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test.
- Vulnerability ID: OTF-005
- Vulnerability type: Improper Input Sanitization
- Threat level: Low
## Description:
It is possible to change the username to that of another chat participant with an additional space character at the end of the name string.
## Technical description:
Assumed users in Chat:
- Alice
- Bob
- Mallory
1. Mallory renames to `Alice `.
2. Mallory sends message as `Alice `.
3. Alice and Bob receive a message from Mallory disguised as `Alice `, which is hard to distinguish from the `Alice`
in the web interface.


Other (invisible) whitespace characters were found to be working as well.
## Impact:
An adversary with access to the chat environment can use the rename feature to impersonate other participants by adding whitespace characters at the end of the username.
## Recommendation:
- Remove non-visible characters from the username | {'CVE-2022-21696'} | 2022-03-03T05:14:17.326552Z | 2022-01-21T23:20:14Z | MODERATE | null | {'CWE-20'} | {'https://github.com/onionshare/onionshare/security/advisories/GHSA-68vr-8f46-vc9f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21696', 'https://github.com/onionshare/onionshare/releases/tag/v2.5', 'https://github.com/onionshare/onionshare'} | null |
PyPI | PYSEC-2019-125 | null | Valve Steam Client before 2019-09-12 allows placing or appending partially controlled filesystem content, as demonstrated by file modifications on Windows in the context of NT AUTHORITY\SYSTEM. This could lead to denial of service, elevation of privilege, or unspecified other impact. | {'CVE-2019-17180'} | 2020-01-16T13:15:00Z | 2019-10-04T20:15:00Z | null | null | null | {'https://habr.com/ru/company/pm/blog/469507/', 'https://hackerone.com/reports/583184', 'https://store.steampowered.com/news/54236/', 'https://hackerone.com/reports/682774', 'https://amonitoring.ru/article/steam_vuln_3/'} | null |
PyPI | GHSA-vcr5-xr9h-mvc5 | Moderate severity vulnerability that affects python-gnupg | python-gnupg 0.3.5 and 0.3.6 allows context-dependent attackers to have an unspecified impact via vectors related to "option injection through positional arguments." NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323. | {'CVE-2014-1929'} | 2022-03-03T05:13:35.610410Z | 2018-11-06T23:12:48Z | MODERATE | null | {'CWE-20'} | {'https://github.com/advisories/GHSA-vcr5-xr9h-mvc5', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1929', 'http://secunia.com/advisories/59031', 'http://www.debian.org/security/2014/dsa-2946', 'http://seclists.org/oss-sec/2014/q1/335', 'http://seclists.org/oss-sec/2014/q1/245'} | null |
PyPI | PYSEC-2021-476 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.QuantizedBatchNormWithGlobalNormalization`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/55a97caa9e99c7f37a0bbbeb414dc55553d3ae7f/tensorflow/core/kernels/quantized_batch_norm_op.cc) does not validate all constraints specified in the op's contract(https://www.tensorflow.org/api_docs/python/tf/raw_ops/QuantizedBatchNormWithGlobalNormalization). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'CVE-2021-29548', 'GHSA-p45v-v4pw-77jr'} | 2021-12-09T06:34:50.800401Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p45v-v4pw-77jr'} | null |
PyPI | GHSA-6m53-c78q-7qmg | Mitmweb in mitmproxy allows DNS Rebinding attacks | mitmweb in mitmproxy before v4.0.4 allows DNS Rebinding attacks, related to tools/web/app.py. | {'CVE-2018-14505'} | 2022-04-26T18:33:05.941757Z | 2018-07-31T18:18:19Z | HIGH | null | {'CWE-20'} | {'https://github.com/mitmproxy/mitmproxy/issues/3234', 'https://github.com/advisories/GHSA-6m53-c78q-7qmg', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14505', 'https://github.com/mitmproxy/mitmproxy', 'https://github.com/mitmproxy/mitmproxy/pull/3243'} | null |
PyPI | PYSEC-2021-533 | null | TensorFlow is an end-to-end open source platform for machine learning. The TFLite code for allocating `TFLiteIntArray`s is vulnerable to an integer overflow issue(https://github.com/tensorflow/tensorflow/blob/4ceffae632721e52bf3501b736e4fe9d1221cdfa/tensorflow/lite/c/common.c#L24-L27). An attacker can craft a model such that the `size` multiplier is so large that the return value overflows the `int` datatype and becomes negative. In turn, this results in invalid value being given to `malloc`(https://github.com/tensorflow/tensorflow/blob/4ceffae632721e52bf3501b736e4fe9d1221cdfa/tensorflow/lite/c/common.c#L47-L52). In this case, `ret->size` would dereference an invalid pointer. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-jf7h-7m85-w2v2', 'CVE-2021-29605'} | 2021-12-09T06:34:59.713113Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jf7h-7m85-w2v2', 'https://github.com/tensorflow/tensorflow/commit/7c8cc4ec69cd348e44ad6a2699057ca88faad3e5'} | null |
PyPI | GHSA-gh8h-7j2j-qv4f | Incomplete validation in `tf.summary.create_file_writer` | ### Impact
If `tf.summary.create_file_writer` is called with non-scalar arguments code crashes due to a `CHECK`-fail.
```python
import tensorflow as tf
import numpy as np
tf.summary.create_file_writer(logdir='', flush_millis=np.ones((1,2)))
```
### Patches
We have patched the issue in GitHub commit [874bda09e6702cd50bac90b453b50bcc65b2769e](https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e) (merging [#51715](https://github.com/tensorflow/tensorflow/pull/51715)).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46909). | {'CVE-2021-41200'} | 2022-03-03T05:12:28.810039Z | 2021-11-10T19:31:16Z | MODERATE | null | {'CWE-617'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41200', 'https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e', 'https://github.com/tensorflow/tensorflow/issues/46909', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh8h-7j2j-qv4f'} | null |
PyPI | PYSEC-2014-32 | null | Cross-site scripting (XSS) vulnerability in kssdevel.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | {'CVE-2012-5490'} | 2021-09-01T08:44:29.407022Z | 2014-09-30T14:55:00Z | null | null | null | {'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt', 'https://plone.org/products/plone-hotfix/releases/20121106', 'https://plone.org/products/plone/security/advisories/20121106/06', 'http://www.openwall.com/lists/oss-security/2012/11/10/1'} | null |
PyPI | PYSEC-2021-163 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a division by 0 in `tf.raw_ops.Conv2D`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/988087bd83f144af14087fe4fecee2d250d93737/tensorflow/core/kernels/conv_ops.cc#L261-L263) does a division by a quantity that is controlled by the caller. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-4vf2-4xcg-65cx', 'CVE-2021-29526'} | 2021-08-27T03:22:25.990763Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4vf2-4xcg-65cx', 'https://github.com/tensorflow/tensorflow/commit/b12aa1d44352de21d1a6faaf04172d8c2508b42b'} | null |
PyPI | PYSEC-2021-9 | null | In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments. | {'CVE-2021-3281', 'GHSA-fvgf-6h6h-3322'} | 2021-03-05T19:19:00Z | 2021-02-02T07:15:00Z | null | null | null | {'https://docs.djangoproject.com/en/3.1/releases/security/', 'https://groups.google.com/forum/#!forum/django-announce', 'https://github.com/advisories/GHSA-fvgf-6h6h-3322', 'https://www.djangoproject.com/weblog/2021/feb/01/security-releases/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/', 'https://security.netapp.com/advisory/ntap-20210226-0004/'} | null |
PyPI | PYSEC-2021-499 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs. The implementation(https://github.com/tensorflow/tensorflow/blob/31bd5026304677faa8a0b77602c6154171b9aec1/tensorflow/core/kernels/image/draw_bounding_box_op.cc#L116-L130) assumes that the last element of `boxes` input is 4, as required by [the op](https://www.tensorflow.org/api_docs/python/tf/raw_ops/DrawBoundingBoxesV2). Since this is not checked attackers passing values less than 4 can write outside of bounds of heap allocated objects and cause memory corruption. If the last dimension in `boxes` is less than 4, accesses similar to `tboxes(b, bb, 3)` will access data outside of bounds. Further during code execution there are also writes to these indices. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'CVE-2021-29571', 'GHSA-whr9-vfh2-7hm6'} | 2021-12-09T06:34:54.370426Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/79865b542f9ffdc9caeb255631f7c56f1d4b6517', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-whr9-vfh2-7hm6'} | null |
PyPI | PYSEC-2018-11 | null | Luigi version prior to version 2.8.0; after commit 53b52e12745075a8acc016d33945d9d6a7a6aaeb; after GitHub PR spotify/luigi/pull/1870 contains a Cross ite Request Forgery (CSRF) vulnerability in API endpoint: /api/<method> that can result in Task metadata such as task name, id, parameter, etc. will be leaked to unauthorized users. This attack appear to be exploitable via The victim must visit a specially crafted webpage from the network where their Luigi server is accessible.. This vulnerability appears to have been fixed in 2.8.0 and later. | {'GHSA-p69g-f978-xxv9', 'CVE-2018-1000843'} | 2021-06-10T06:51:41.493009Z | 2018-12-20T15:29:00Z | null | null | null | {'https://groups.google.com/forum/#!topic/luigi-user/ZgfRTpBsVUY', 'https://github.com/spotify/luigi/blob/2.7.9/luigi/server.py#L67', 'https://github.com/spotify/luigi/pull/1870', 'https://github.com/advisories/GHSA-p69g-f978-xxv9'} | null |
PyPI | PYSEC-2020-97 | null | In qutebrowser versions less than 1.11.1, reloading a page with certificate errors shows a green URL. After a certificate error was overridden by the user, qutebrowser displays the URL as yellow (colors.statusbar.url.warn.fg). However, when the affected website was subsequently loaded again, the URL was mistakenly displayed as green (colors.statusbar.url.success_https). While the user already has seen a certificate error prompt at this point (or set content.ssl_strict to false, which is not recommended), this could still provide a false sense of security. This has been fixed in 1.11.1 and 1.12.0. All versions of qutebrowser are believed to be affected, though versions before v0.11.x couldn't be tested. Backported patches for older versions (greater than or equal to 1.4.0 and less than or equal to 1.10.2) are available, but no further releases are planned. | {'GHSA-4rcq-jv2f-898j', 'CVE-2020-11054'} | 2020-09-21T02:15:00Z | 2020-05-07T21:15:00Z | null | null | null | {'https://github.com/qutebrowser/qutebrowser/commit/a45ca9c788f648d10cccce2af41405bf25ee2948', 'https://tracker.die-offenbachs.homelinux.org/eric/issue328', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKAZOOTJ2MBHTYVYQQ52NL53F5CB2XAP/', 'https://github.com/qutebrowser/qutebrowser/commit/6821c236f9ae23adf21d46ce0d56768ac8d0c467', 'https://github.com/qutebrowser/qutebrowser/commit/d28ed758d077a5bf19ddac4da468f7224114df23', 'https://github.com/qutebrowser/qutebrowser/commit/9bd1cf585fccdfe8318fff7af793730e74a04db3', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7YWJ5QNHXKTGG5NLV7EGEOKPBVZBA5GS/', 'https://github.com/qutebrowser/qutebrowser/commit/021ab572a319ca3db5907a33a59774f502b3b975', 'https://github.com/qutebrowser/qutebrowser/commit/19f01bb42d02da539446a52a25bb0c1232b86327', 'https://github.com/qutebrowser/qutebrowser/commit/f5d801251aa5436aff44660c87d7013e29ac5864', 'https://github.com/qutebrowser/qutebrowser/issues/5403', 'https://github.com/qutebrowser/qutebrowser/commit/4020210b193f77cf1785b21717f6ef7c5de5f0f8', 'https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-4rcq-jv2f-898j', 'https://github.com/qutebrowser/qutebrowser/commit/2281a205c3e70ec20f35ec8fafecee0d5c4f3478', 'https://github.com/qutebrowser/qutebrowser/commit/1b7946ed14b386a24db050f2d6dba81ba6518755', 'https://bugs.kde.org/show_bug.cgi?id=420902'} | null |
PyPI | PYSEC-2021-860 | null | Croatia Control Asterix 2.8.1 (python_v0.7.2) has a heap-based buffer over-read, with additional details to be disclosed at a later date. | {'CVE-2021-44144'} | 2022-01-05T02:16:11.881162Z | 2021-11-22T21:15:00Z | null | null | null | {'https://github.com/CroatiaControlLtd/asterix/issues/183', 'https://github.com/croatiacontrolltd/asterix/commit/3f765d387d239ccc44e278a2ffa600fb6a6587f9'} | null |
PyPI | GHSA-537h-rv9q-vvph | Access Restriction Bypass | Python-RSA 4.0 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation). | {'CVE-2020-13757'} | 2022-03-03T05:13:32.780333Z | 2021-03-24T18:24:39Z | HIGH | null | {'CWE-327'} | {'https://github.com/sybrenstuvel/python-rsa/issues/146#issuecomment-641845667', 'https://github.com/sybrenstuvel/python-rsa/issues/146', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13757', 'https://usn.ubuntu.com/4478-1/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZYB65VNILRBTXL6EITQTH2PZPK7I23MW/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KILTHBHNSDUCYV22ODLOKTICJJ7JQIQ/'} | null |
PyPI | PYSEC-2020-163 | null | A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create false transactions. | {'CVE-2019-14859', 'GHSA-8qxj-f9rh-9fg2'} | 2020-12-08T18:32:00Z | 2020-01-02T15:15:00Z | null | null | null | {'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14859', 'https://pypi.org/project/ecdsa/0.13.3/', 'https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3', 'https://github.com/warner/python-ecdsa/issues/114', 'https://github.com/advisories/GHSA-8qxj-f9rh-9fg2'} | null |
PyPI | GHSA-vfrc-ggmc-5jwv | Cross-site Scripting in django-helpdesk | django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2021-3950'} | 2022-03-03T05:13:21.706511Z | 2021-11-23T17:55:46Z | HIGH | null | {'CWE-79'} | {'https://github.com/django-helpdesk/django-helpdesk/commit/04483bdac3b5196737516398b5ce0383875a5c60', 'https://huntr.dev/bounties/4d7a5fdd-b2de-467a-ade0-3f2fb386638e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3950', 'https://github.com/django-helpdesk/django-helpdesk', 'https://github.com/django-helpdesk/django-helpdesk/releases/tag/0.3.2'} | null |
PyPI | GHSA-xwhf-g6j5-j5gc | Float cast overflow undefined behavior | ### Impact
When the `boxes` argument of `tf.image.crop_and_resize` has a very large value, the CPU kernel implementation receives it as a C++ `nan` floating point value. Attempting to operate on this is undefined behavior which later produces a segmentation fault.
### Patches
We have patched the issue in c0319231333f0f16e1cc75ec83660b01fedd4182 and will release TensorFlow 2.4.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported in #42129 | {'CVE-2020-15266'} | 2022-03-03T05:13:49.090611Z | 2020-11-13T17:18:29Z | LOW | null | {'CWE-119'} | {'https://github.com/tensorflow/tensorflow/issues/42129', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xwhf-g6j5-j5gc', 'https://github.com/tensorflow/tensorflow', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15266', 'https://github.com/tensorflow/tensorflow/pull/42143/commits/3ade2efec2e90c6237de32a19680caaa3ebc2845'} | null |
PyPI | GHSA-cwv3-863g-39vx | Stack overflow due to looping TFLite subgraph | ### Impact
TFlite graphs must not have loops between nodes. However, this condition was not checked and an attacker could craft models that would result in infinite loop during evaluation. In certain cases, the infinite loop would be replaced by stack overflow due to too many recursive calls.
For example, the [`While` implementation](https://github.com/tensorflow/tensorflow/blob/106d8f4fb89335a2c52d7c895b7a7485465ca8d9/tensorflow/lite/kernels/while.cc) could be tricked into a scneario where both the body and the loop subgraphs are the same. Evaluating one of the subgraphs means calling the `Eval` function for the other and this quickly exhaust all stack space.
### Patches
We have patched the issue in GitHub commit [9c1dc920d8ffb4893d6c9d27d1f039607b326743](https://github.com/tensorflow/tensorflow/commit/9c1dc920d8ffb4893d6c9d27d1f039607b326743) (for the `While` operator) and in GitHub commit [c6173f5fe66cdbab74f4f869311fe6aae2ba35f4](https://github.com/tensorflow/tensorflow/commit/c6173f5fe66cdbab74f4f869311fe6aae2ba35f4) (in general).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-29591'} | 2022-04-26T18:17:12.504780Z | 2021-05-21T14:26:56Z | HIGH | null | {'CWE-835', 'CWE-674'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29591', 'https://github.com/tensorflow/tensorflow/commit/9c1dc920d8ffb4893d6c9d27d1f039607b326743', 'https://github.com/tensorflow/tensorflow/commit/c6173f5fe66cdbab74f4f869311fe6aae2ba35f4', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cwv3-863g-39vx'} | null |
PyPI | GHSA-8fxc-qm65-vpxg | Temporary urls leaked via logging | In OpenStack Swift prior to 2.15.2, the proxy-server logs full tempurl paths, potentially leaking reusable tempurl signatures to anyone with read access to these logs. All Swift deployments using the tempurl middleware are affected. | {'CVE-2017-8761'} | 2022-03-03T05:13:37.549477Z | 2021-06-08T19:23:22Z | LOW | null | {'CWE-117', 'CWE-200'} | {'https://launchpad.net/bugs/1685798', 'https://bugs.launchpad.net/swift/+bug/1685798/comments/18', 'https://nvd.nist.gov/vuln/detail/CVE-2017-8761'} | null |
PyPI | GHSA-4hvv-7x94-7vq8 | Null dereference in Grappler's `TrySimplify` | ### Impact
The implementation of [`TrySimplify`](https://github.com/tensorflow/tensorflow/blob/c22d88d6ff33031aa113e48aa3fc9aa74ed79595/tensorflow/core/grappler/optimizers/arithmetic_optimizer.cc#L390-L401) has undefined behavior due to dereferencing a null pointer in corner cases that
result in optimizing a node with no inputs.
### Patches
We have patched the issue in GitHub commit [e6340f0665d53716ef3197ada88936c2a5f7a2d3](https://github.com/tensorflow/tensorflow/commit/e6340f0665d53716ef3197ada88936c2a5f7a2d3).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2021-29616'} | 2022-03-03T05:14:00.916803Z | 2021-05-21T14:28:47Z | LOW | null | {'CWE-476'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hvv-7x94-7vq8', 'https://github.com/tensorflow/tensorflow/commit/e6340f0665d53716ef3197ada88936c2a5f7a2d3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29616'} | null |
PyPI | PYSEC-2021-708 | null | TensorFlow is an end-to-end open source platform for machine learning. Due to lack of validation in `tf.raw_ops.Dequantize`, an attacker can trigger a read from outside of bounds of heap allocated data. The implementation(https://github.com/tensorflow/tensorflow/blob/26003593aa94b1742f34dc22ce88a1e17776a67d/tensorflow/core/kernels/dequantize_op.cc#L106-L131) accesses the `min_range` and `max_range` tensors in parallel but fails to check that they have the same shape. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-c45w-2wxr-pp53', 'CVE-2021-29582'} | 2021-12-09T06:35:28.875018Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/5899741d0421391ca878da47907b1452f06aaf1b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c45w-2wxr-pp53'} | null |
PyPI | PYSEC-2021-358 | null | A flaw was found in Ansible, where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity. | {'CVE-2021-3583', 'GHSA-2pfh-q76x-gwvm'} | 2021-10-11T01:16:39.746753Z | 2021-09-22T12:15:00Z | null | null | null | {'https://github.com/advisories/GHSA-2pfh-q76x-gwvm', 'https://bugzilla.redhat.com/show_bug.cgi?id=1968412'} | null |
PyPI | GHSA-35m5-8cvj-8783 | Improper hashing in enrocrypt | ### Impact
The vulnerability is we used MD5 hashing Algorithm In our hashing file. If anyone who is a beginner(and doesn't know about hashes) can face problems as MD5 is considered a Insecure Hashing Algorithm.
### Patches
The vulnerability is patched in v1.1.4 of the product, the users can upgrade to version 1.1.4.
### Workarounds
If u specifically want a version and don't want to upgrade, you can remove the `MD5` hashing function from the file `hashing.py` and this vulnerability will be gone
### References
https://www.cybersecurity-help.cz/vdb/cwe/916/
https://www.cybersecurity-help.cz/vdb/cwe/327/
https://www.cybersecurity-help.cz/vdb/cwe/328/
https://www.section.io/engineering-education/what-is-md5/
https://www.johndcook.com/blog/2019/01/24/reversing-an-md5-hash/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [**Enrocrypt's Official Repo**](http://www.github.com/Morgan-Phoenix/EnroCrypt)
* Create a Discussion in [**Enrocrypt's Official Repo**](http://www.github.com/Morgan-Phoenix/EnroCrypt)
| {'CVE-2021-39182'} | 2022-03-03T05:11:36.826995Z | 2021-11-10T16:28:46Z | HIGH | null | {'CWE-916', 'CWE-328', 'CWE-327'} | {'https://github.com/Morgan-Phoenix/EnroCrypt/security/advisories/GHSA-35m5-8cvj-8783', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39182', 'https://github.com/Morgan-Phoenix/EnroCrypt', 'https://github.com/Morgan-Phoenix/EnroCrypt/commit/e652d56ac60eadfc26489ab83927af13a9b9d8ce'} | null |
PyPI | GHSA-fxqh-cfjm-fp93 | Division by 0 in `Reverse` | ### Impact
An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.Reverse`:
```python
import tensorflow as tf
tensor_input = tf.constant([], shape=[0, 1, 1], dtype=tf.int32)
dims = tf.constant([False, True, False], shape=[3], dtype=tf.bool)
tf.raw_ops.Reverse(tensor=tensor_input, dims=dims)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/36229ea9e9451dac14a8b1f4711c435a1d84a594/tensorflow/core/kernels/reverse_op.cc#L75-L76) performs a division based on the first dimension of the tensor argument:
```cc
const int64 N = input.dim_size(0);
const int64 cost_per_unit = input.NumElements() / N;
```
Since this is controlled by the user, an attacker can trigger a denial of service.
### Patches
We have patched the issue in GitHub commit [4071d8e2f6c45c1955a811fee757ca2adbe462c1](https://github.com/tensorflow/tensorflow/commit/4071d8e2f6c45c1955a811fee757ca2adbe462c1).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team. | {'CVE-2021-29556'} | 2022-03-03T05:13:10.573532Z | 2021-05-21T14:24:39Z | LOW | null | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fxqh-cfjm-fp93', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29556', 'https://github.com/tensorflow/tensorflow/commit/4071d8e2f6c45c1955a811fee757ca2adbe462c1'} | null |
PyPI | GHSA-xc3p-ff3m-f46v | Insecure input handling in Flask-Cors | An issue was discovered in Flask-CORS (aka CORS Middleware for Flask) before 3.0.9. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format. | {'CVE-2020-25032'} | 2022-04-29T20:33:26.063099Z | 2021-05-06T18:51:48Z | HIGH | null | {'CWE-22'} | {'https://github.com/corydolphin/flask-cors/releases/tag/3.0.9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25032', 'https://github.com/corydolphin/flask-cors', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00048.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00032.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00028.html', 'https://www.debian.org/security/2020/dsa-4775', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00039.html', 'https://github.com/corydolphin/flask-cors/commit/67c4b2cc98ae87cf1fa7df4f97fd81b40c79b895'} | null |
PyPI | PYSEC-2017-75 | null | In aubio 0.4.6, a divide-by-zero error exists in the function new_aubio_source_wavread() in source_wavread.c, which may lead to DoS when playing a crafted audio file. | {'CVE-2017-17054'} | 2021-08-25T04:29:55.630157Z | 2017-11-29T07:29:00Z | null | null | null | {'https://github.com/aubio/aubio/issues/148'} | null |
PyPI | GHSA-wqvq-5m8c-6g24 | CRLF injection | urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116. | {'CVE-2020-26137'} | 2022-03-03T05:14:02.786960Z | 2021-06-18T18:46:43Z | MODERATE | null | {'CWE-74'} | {'https://github.com/urllib3/urllib3/pull/1800', 'https://github.com/urllib3/urllib3/commit/1dd69c5c5982fae7c87a620d487c2ebf7a6b436b', 'https://bugs.python.org/issue39603', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://usn.ubuntu.com/4570-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26137', 'https://lists.debian.org/debian-lts-announce/2021/06/msg00015.html', 'https://github.com/urllib3/urllib3'} | null |
PyPI | PYSEC-2021-421 | null | Babel.Locale in Babel before 2.9.1 allows attackers to load arbitrary locale .dat files (containing serialized Python objects) via directory traversal, leading to code execution. | {'GHSA-h4m5-qpfp-3mpv', 'CVE-2021-42771'} | 2021-11-16T03:58:43.401152Z | 2021-10-20T21:15:00Z | null | null | null | {'https://lists.debian.org/debian-lts/2021/10/msg00040.html', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00018.html', 'https://www.tenable.com/security/research/tra-2021-14', 'https://github.com/python-babel/babel/pull/782', 'https://github.com/advisories/GHSA-h4m5-qpfp-3mpv'} | null |
PyPI | PYSEC-2019-172 | null | In Apache Incubator Superset before 0.31 user could query database metadata information from a database he has no access to, by using a specially crafted complex query. | {'CVE-2019-12413', 'GHSA-p5w7-qmq6-pmjr'} | 2020-08-24T17:37:00Z | 2019-12-16T22:15:00Z | null | null | null | {'https://lists.apache.org/thread.html/85ab04f8c52df8c353ecfa0ecd2ff27fc07fb8ab7566a754349806be%40%3Cdev.superset.apache.org%3E', 'https://github.com/advisories/GHSA-p5w7-qmq6-pmjr'} | null |
PyPI | GHSA-f865-m6cq-j9vx | ReDOS in Mpmath | A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Mpmath v1.0.0 when the mpmathify function is called. | {'CVE-2021-29063'} | 2022-03-03T05:12:52.232066Z | 2021-08-09T20:44:51Z | HIGH | null | {'CWE-770'} | {'https://github.com/fredrik-johansson/mpmath', 'https://www.npmjs.com/package/hosted-git-info', 'https://github.com/npm/hosted-git-info/pull/76', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUX3XWY2K3MSO7QXMZXQQYAURARSPC5/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29063', 'https://github.com/yetingli/PoCs/blob/main/CVE-2021-29063/Mpmath.md', 'https://github.com/fredrik-johansson/mpmath/commit/c811b37c65a4372a7ce613111d2a508c204f9833', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MS2U6GLXQSRZJE2HVUAUMVFR2DWQLCZG/', 'https://github.com/fredrik-johansson/mpmath/issues/548', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3M5O55E7VUDMXCPQR6MQTOIFDKHP36AA/', 'https://github.com/yetingli/SaveResults/blob/main/js/hosted-git-info.js'} | null |
PyPI | PYSEC-2022-12 | null | IPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language. Affected versions are subject to an arbitrary code execution vulnerability achieved by not properly managing cross user temporary files. This vulnerability allows one user to run code as another on the same machine. All users are advised to upgrade. | {'GHSA-pq7m-3gw7-gq5x', 'CVE-2022-21699'} | 2022-01-26T19:22:31.675139Z | 2022-01-19T22:15:00Z | null | null | null | {'https://github.com/ipython/ipython/security/advisories/GHSA-pq7m-3gw7-gq5x', 'https://github.com/ipython/ipython/commit/46a51ed69cdf41b4333943d9ceeb945c4ede5668', 'https://lists.debian.org/debian-lts-announce/2022/01/msg00021.html', 'https://ipython.readthedocs.io/en/stable/whatsnew/version8.html#ipython-8-0-1-cve-2022-21699'} | null |
PyPI | GHSA-562c-5r94-xh97 | The Pallets Project in flask that can result in large amount of memory usage | The Pallets Project flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appears to have been fixed in 0.12.3. | {'CVE-2018-1000656'} | 2022-04-26T18:33:05.537365Z | 2018-08-23T19:10:40Z | HIGH | null | {'CWE-20'} | {'https://github.com/advisories/GHSA-562c-5r94-xh97', 'https://github.com/pallets/flask/pull/2691', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000656', 'https://github.com/pallets/flask/releases/tag/0.12.3', 'https://lists.debian.org/debian-lts-announce/2019/08/msg00025.html', 'https://usn.ubuntu.com/4378-1/', 'https://security.netapp.com/advisory/ntap-20190221-0001/'} | null |
PyPI | PYSEC-2020-134 | null | In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices for the tensors, indexing into an array of tensors that is owned by the subgraph. This results in a pattern of double array indexing when trying to get the data of each tensor. However, some operators can have some tensors be optional. To handle this scenario, the flatbuffer model uses a negative `-1` value as index for these tensors. This results in special casing during validation at model loading time. Unfortunately, this means that the `-1` index is a valid tensor index for any operator, including those that don't expect optional inputs and including for output tensors. Thus, this allows writing and reading from outside the bounds of heap allocated arrays, although only at a specific offset from the start of these arrays. This results in both read and write gadgets, albeit very limited in scope. The issue is patched in several commits (46d5b0852, 00302787b7, e11f5558, cd31fd0ce, 1970c21, and fff2c83), and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. A potential workaround would be to add a custom `Verifier` to the model loading code to ensure that only operators which accept optional inputs use the `-1` special value and only for the tensors that they expect to be optional. Since this allow-list type approach is erro-prone, we advise upgrading to the patched code. | {'GHSA-cvpc-8phh-8f45', 'CVE-2020-15211'} | 2020-10-29T16:15:00Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/fff2c8326280c07733828f990548979bdc893859', 'https://github.com/tensorflow/tensorflow/commit/cd31fd0ce0449a9e0f83dcad08d6ed7f1d6bef3f', 'https://github.com/tensorflow/tensorflow/commit/00302787b788c5ff04cb6f62aed5a74d936e86c0', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cvpc-8phh-8f45', 'https://github.com/tensorflow/tensorflow/commit/1970c2158b1ffa416d159d03c3370b9a462aee35', 'https://github.com/tensorflow/tensorflow/commit/e11f55585f614645b360563072ffeb5c3eeff162', 'https://github.com/tensorflow/tensorflow/commit/46d5b0852528ddfd614ded79bccc75589f801bd9', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'} | null |
PyPI | PYSEC-2021-837 | null | Invenio-Drafts-Resources is a submission/deposit module for Invenio, a software framework for research data management. Invenio-Drafts-Resources prior to versions 0.13.7 and 0.14.6 does not properly check permissions when a record is published. The vulnerability is exploitable in a default installation of InvenioRDM. An authenticated a user is able via REST API calls to publish draft records of other users if they know the record identifier and the draft validates (e.g. all require fields filled out). An attacker is not able to modify the data in the record, and thus e.g. *cannot* change a record from restricted to public. The problem is patched in Invenio-Drafts-Resources v0.13.7 and 0.14.6, which is part of InvenioRDM v6.0.1 and InvenioRDM v7.0 respectively. | {'CVE-2021-43781', 'GHSA-xr38-w74q-r8jv'} | 2021-12-10T06:37:24.185813Z | 2021-12-06T18:15:00Z | null | null | null | {'https://github.com/inveniosoftware/invenio-drafts-resources/commit/039b0cff1ad4b952000f4d8c3a93f347108b6626', 'https://github.com/inveniosoftware/invenio-drafts-resources/security/advisories/GHSA-xr38-w74q-r8jv'} | null |
PyPI | PYSEC-2010-26 | null | Dan Pascu python-cjson 1.0.5 does not properly handle a ['/'] argument to cjson.encode, which makes it easier for remote attackers to conduct certain cross-site scripting (XSS) attacks involving Firefox and the end tag of a SCRIPT element. | {'GHSA-95jp-77w6-qj52', 'CVE-2009-4924'} | 2021-07-16T01:31:29.455845Z | 2010-07-02T19:30:00Z | null | null | null | {'http://pypi.python.org/pypi/python-cjson/', 'http://t3.dotgnu.info/blog/insecurity/quotes-dont-help.html', 'https://github.com/advisories/GHSA-95jp-77w6-qj52'} | null |
PyPI | GHSA-2473-9hgq-j7xw | Cross-Site Scripting in Wagtail | ### Impact
When a form page type is made available to Wagtail editors through the `wagtail.contrib.forms` app, and the page template is built using Django's standard form rendering helpers such as `form.as_p` ([as directed in the documentation](https://docs.wagtail.io/en/stable/reference/contrib/forms/index.html#usage)), any HTML tags used within a form field's help text will be rendered unescaped in the page. Allowing HTML within help text is [an intentional design decision](https://docs.djangoproject.com/en/3.0/ref/models/fields/#django.db.models.Field.help_text) by Django; however, as a matter of policy Wagtail does not allow editors to insert arbitrary HTML by default, as this could potentially be used to carry out cross-site scripting attacks, including privilege escalation. This functionality should therefore not have been made available to editor-level users.
The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin.
### Patches
Patched versions have been released as Wagtail 2.7.4 (for the LTS 2.7 branch) and Wagtail 2.9.3 (for the current 2.9 branch). In these versions, help text will be escaped to prevent the inclusion of HTML tags. Site owners who wish to re-enable the use of HTML within help text (and are willing to accept the risk of this being exploited by editors) may set `WAGTAILFORMS_HELP_TEXT_ALLOW_HTML = True` in their configuration settings.
### Workarounds
Site owners who are unable to upgrade to the new versions can secure their form page templates by [rendering forms field-by-field as per Django's documentation](https://docs.djangoproject.com/en/3.0/topics/forms/#looping-over-the-form-s-fields), but omitting the `|safe` filter when outputting the help text.
### Acknowledgements
Many thanks to Timothy Bautista for reporting this issue.
### For more information
If you have any questions or comments about this advisory:
* Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html)
* Email us at [security@wagtail.io](mailto:security@wagtail.io) (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`) | {'CVE-2020-15118'} | 2022-03-03T05:13:59.610986Z | 2020-07-20T17:50:30Z | MODERATE | null | {'CWE-79'} | {'https://github.com/wagtail/wagtail/security/advisories/GHSA-2473-9hgq-j7xw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15118', 'https://docs.djangoproject.com/en/3.0/ref/models/fields/#django.db.models.Field.help_text', 'https://github.com/wagtail/wagtail/blob/master/docs/releases/2.9.3.rst', 'https://docs.wagtail.io/en/stable/reference/contrib/forms/index.html#usage', 'https://github.com/wagtail/wagtail/commit/d9a41e7f24d08c024acc9a3094940199df94db34'} | null |
PyPI | GHSA-x9j7-x98r-r4w2 | Segmentation fault in tensorflow-lite | ### Impact
If a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption.
### Patches
We have patched the issue in d58c96946b and will release patch releases for all versions between 1.15 and 2.3.
We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### Workarounds
A potential workaround would be to add a custom `Verifier` to the model loading code to ensure that no operator reuses tensors as both inputs and outputs. Care should be taken to check all types of inputs (i.e., constant or variable tensors as well as optional tensors).
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been discovered from a variant analysis of [GHSA-cvpc-8phh-8f45](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cvpc-8phh-8f45). | {'CVE-2020-15210'} | 2022-03-03T05:14:16.385167Z | 2020-09-25T18:28:51Z | MODERATE | null | {'CWE-20', 'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15210', 'https://github.com/tensorflow/tensorflow/commit/d58c96946b2880991d63d1dacacb32f0a4dfa453', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x9j7-x98r-r4w2', 'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'} | null |
PyPI | PYSEC-2018-46 | null | Anymail django-anymail version version 0.2 through 1.3 contains a CWE-532, CWE-209 vulnerability in WEBHOOK_AUTHORIZATION setting value that can result in An attacker with access to error logs could fabricate email tracking events. This attack appear to be exploitable via If you have exposed your Django error reports, an attacker could discover your ANYMAIL_WEBHOOK setting and use this to post fabricated or malicious Anymail tracking/inbound events to your app. This vulnerability appears to have been fixed in v1.4. | {'CVE-2018-1000089'} | 2021-07-05T00:01:17.580240Z | 2018-03-13T15:29:00Z | null | null | null | {'https://github.com/anymail/django-anymail/commit/1a6086f2b58478d71f89bf27eb034ed81aefe5ef', 'https://github.com/anymail/django-anymail/releases/tag/v1.4'} | null |
PyPI | PYSEC-2021-134 | null | Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.27.0, the notification emails sent for notifications for missed messages or for an expiring account are subject to HTML injection. In the case of the notification for missed messages, this could allow an attacker to insert forged content into the email. The account expiry feature is not enabled by default and the HTML injection is not controllable by an attacker. This is fixed in version 1.27.0. | {'GHSA-c5f8-35qr-q4fm', 'CVE-2021-21333'} | 2021-08-27T03:22:06.710356Z | 2021-03-26T20:15:00Z | null | null | null | {'https://github.com/matrix-org/synapse/pull/9200', 'https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df', 'https://github.com/matrix-org/synapse/releases/tag/v1.27.0', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-c5f8-35qr-q4fm'} | null |
PyPI | GHSA-8f4m-hccc-8qph | Insertion of Sensitive Information into Log File in ansible | A flaw was found in ansible. Credentials, such as secrets, are being disclosed in console log by default and not protected by no_log feature when using those modules. An attacker can take advantage of this information to steal those credentials. The highest threat from this vulnerability is to data confidentiality. | {'CVE-2021-20191'} | 2022-03-03T05:13:36.151665Z | 2021-06-01T21:38:33Z | MODERATE | null | {'CWE-532'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-20191', 'https://access.redhat.com/security/cve/cve-2021-20191', 'https://bugzilla.redhat.com/show_bug.cgi?id=1916813'} | null |
PyPI | PYSEC-2014-65 | null | Products/CMFPlone/FactoryTool.py in Plone 3.3 through 4.3.2 allows remote attackers to obtain the installation path via vectors related to a file object for unspecified documentation which is initialized in class scope. | {'CVE-2013-7060'} | 2021-07-25T23:34:47.572941Z | 2014-05-02T14:55:00Z | null | null | null | {'http://www.openwall.com/lists/oss-security/2013/12/10/15', 'https://plone.org/security/20131210/path-leak', 'http://www.openwall.com/lists/oss-security/2013/12/12/3'} | null |
PyPI | PYSEC-2021-564 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation for `tf.raw_ops.FractionalAvgPoolGrad` can be tricked into accessing data outside of bounds of heap allocated buffers. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/fractional_avg_pool_op.cc#L205) does not validate that the input tensor is non-empty. Thus, code constructs an empty `EigenDoubleMatrixMap` and then accesses this buffer with indices that are outside of the empty area. We have patched the issue in GitHub commit 0f931751fb20f565c4e94aa6df58d54a003cdb30. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'GHSA-hpv4-7p9c-mvfr', 'CVE-2021-37651'} | 2021-12-09T06:35:03.344534Z | 2021-08-12T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hpv4-7p9c-mvfr', 'https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30'} | null |
PyPI | PYSEC-2017-63 | null | Multiple cross-site scripting (XSS) vulnerabilities in the ZMI page in Zope2 in Plone CMS 5.x through 5.0.6, 4.x through 4.3.11, and 3.3.x through 3.3.6 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | {'CVE-2016-7140'} | 2021-07-25T23:34:49.606999Z | 2017-03-07T16:59:00Z | null | null | null | {'http://seclists.org/fulldisclosure/2016/Oct/80', 'https://plone.org/security/hotfix/20160830/non-persistent-xss-in-zope2', 'http://www.securityfocus.com/archive/1/539572/100/0/threaded', 'http://www.securityfocus.com/bid/92752', 'http://www.openwall.com/lists/oss-security/2016/09/05/5', 'http://www.openwall.com/lists/oss-security/2016/09/05/4', 'http://packetstormsecurity.com/files/139110/Plone-CMS-4.3.11-5.0.6-XSS-Traversal-Open-Redirection.html'} | null |
PyPI | PYSEC-2015-8 | null | Cross-site scripting (XSS) vulnerability in the contents function in admin/helpers.py in Django before 1.7.6 and 1.8 before 1.8b2 allows remote attackers to inject arbitrary web script or HTML via a model attribute in ModelAdmin.readonly_fields, as demonstrated by a @property. | {'CVE-2015-2241'} | 2021-07-05T00:01:19.894697Z | 2015-03-12T14:59:00Z | null | null | null | {'http://www.securityfocus.com/bid/73095', 'https://www.djangoproject.com/weblog/2015/mar/09/security-releases/', 'https://code.djangoproject.com/ticket/24461', 'http://www.mandriva.com/security/advisories?name=MDVSA-2015:109'} | null |
PyPI | GHSA-w6j4-3gh2-9f5j | High severity vulnerability that affects apache-airflow | A number of HTTP endpoints in the Airflow webserver (both RBAC and classic) did not have adequate protection and were vulnerable to cross-site request forgery attacks. | {'CVE-2019-0229'} | 2022-03-03T05:13:37.198154Z | 2019-04-18T14:27:40Z | HIGH | null | {'CWE-352'} | {'https://github.com/apache/airflow', 'https://github.com/advisories/GHSA-w6j4-3gh2-9f5j', 'https://lists.apache.org/thread.html/2de387213d45bc626d27554a1bde7b8c67d08720901f82a50b6f4231@%3Cdev.airflow.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0229', 'http://www.securityfocus.com/bid/107869', 'http://www.openwall.com/lists/oss-security/2019/04/10/6'} | null |
PyPI | GHSA-h39g-q63v-4h9p | Exposure of sensitive information to an unauthorized actor | An issue was discovered in management/commands/hyperkitty_import.py in HyperKitty through 1.3.4. When importing a private mailing list's archives, these archives are publicly visible for the duration of the import. For example, sensitive information might be available on the web for an hour during a large migration from Mailman 2 to Mailman 3. | {'CVE-2021-33038'} | 2022-03-03T05:12:54.967013Z | 2021-06-01T21:56:23Z | HIGH | null | {'CWE-200'} | {'https://www.debian.org/security/2021/dsa-4922', 'https://gitlab.com/mailman/hyperkitty/-/commit/9025324597d60b2dff740e49b70b15589d6804fa', 'https://techblog.wikimedia.org/2021/06/11/discovering-and-fixing-cve-2021-33038-in-mailman3/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33038', 'https://gitlab.com/mailman/hyperkitty/-/issues/380'} | null |
PyPI | PYSEC-2013-20 | null | Directory traversal vulnerability in Django 1.4.x before 1.4.7, 1.5.x before 1.5.3, and 1.6.x before 1.6 beta 3 allows remote attackers to read arbitrary files via a file path in the ALLOWED_INCLUDE_ROOTS setting followed by a .. (dot dot) in a ssi template tag. | {'CVE-2013-4315'} | 2021-07-15T02:22:08.994909Z | 2013-09-16T19:14:00Z | null | null | null | {'http://www.debian.org/security/2013/dsa-2755', 'http://secunia.com/advisories/54772', 'http://secunia.com/advisories/54828', 'http://lists.opensuse.org/opensuse-updates/2013-10/msg00015.html', 'https://www.djangoproject.com/weblog/2013/sep/10/security-releases-issued/', 'http://rhn.redhat.com/errata/RHSA-2013-1521.html'} | null |
PyPI | GHSA-2r8p-fg3c-wcj4 | Heap OOB and CHECK fail in `ResourceGather` | ### Impact
An attacker can trigger a crash via a `CHECK`-fail in debug builds of TensorFlow using `tf.raw_ops.ResourceGather` or a read from outside the bounds of heap allocated data in the same API in a release build:
```python
import tensorflow as tf
tensor = tf.constant(value=[[1,2],[3,4],[5,6]],shape=(3,2),dtype=tf.uint32)
v = tf.Variable(tensor)
tf.raw_ops.ResourceGather(
resource=v.handle,
indices=[0],
dtype=tf.uint32,
batch_dims=10,
validate_indices=False)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/resource_variable_ops.cc#L660-L668) does not check that the `batch_dims` value that the user supplies is less than the rank of the input tensor.
Since the implementation uses several for loops over the dimensions of `tensor`, this results in reading data from outside the bounds of heap allocated buffer backing the tensor:
```cc
// batch_dims_ = > params.dims() (10 > 2)
for (int i = 0; i < batch_dims_; ++i) {
result_shape.AddDim(params.dim_size(i));
}
for (int i = batch_dims_; i < indices.dims(); ++i) {
result_shape.AddDim(indices.dim_size(i));
}
for (int i = batch_dims_ + 1; i < params.dims(); ++i) {
result_shape.AddDim(params.dim_size(i));
}
```
In debug mode, `.dim_size(i)` validates that the argument is less than `.dims()` using a `DCHECK`. But the `DCHECK` is a no-op in release builds.
### Patches
We have patched the issue in GitHub commit [bc9c546ce7015c57c2f15c168b3d9201de679a1d](https://github.com/tensorflow/tensorflow/commit/bc9c546ce7015c57c2f15c168b3d9201de679a1d).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37654'} | 2022-03-03T05:13:57.699257Z | 2021-08-25T14:43:01Z | HIGH | null | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2r8p-fg3c-wcj4', 'https://github.com/tensorflow/tensorflow/commit/bc9c546ce7015c57c2f15c168b3d9201de679a1d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37654', 'https://github.com/tensorflow/tensorflow/'} | null |
PyPI | PYSEC-2020-39 | null | Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authentication code. This means that the password is stored in clear text in the session for an arbitrary amount of time, and potentially forever if the user begins the login process by entering their username and password and then leaves before entering their two-factor authentication code. The severity of this issue depends on which type of session storage you have configured: in the worst case, if you're using Django's default database session storage, then users' passwords are stored in clear text in your database. In the best case, if you're using Django's signed cookie session, then users' passwords are only stored in clear text within their browser's cookie store. In the common case of using Django's cache session store, the users' passwords are stored in clear text in whatever cache storage you have configured (typically Memcached or Redis). This has been fixed in 1.12. After upgrading, users should be sure to delete any clear text passwords that have been stored. For example, if you're using the database session backend, you'll likely want to delete any session record from the database and purge that data from any database backups or replicas. In addition, affected organizations who have suffered a database breach while using an affected version should inform their users that their clear text passwords have been compromised. All organizations should encourage users whose passwords were insecurely stored to change these passwords on any sites where they were used. As a workaround, wwitching Django's session storage to use signed cookies instead of the database or cache lessens the impact of this issue, but should not be done without a thorough understanding of the security tradeoffs of using signed cookies rather than a server-side session storage. There is no way to fully mitigate the issue without upgrading. | {'GHSA-vhr6-pvjm-9qwf', 'CVE-2020-15105'} | 2020-07-21T18:06:00Z | 2020-07-10T21:15:00Z | null | null | null | {'https://github.com/Bouke/django-two-factor-auth/security/advisories/GHSA-vhr6-pvjm-9qwf', 'https://github.com/Bouke/django-two-factor-auth/commit/454fd9842fa6e8bb772dbf0943976bc8e3335359', 'https://github.com/Bouke/django-two-factor-auth/blob/master/CHANGELOG.md#112---2020-07-08'} | null |
PyPI | PYSEC-2019-164 | null | aubio v0.4.0 to v0.4.8 has a new_aubio_onset NULL pointer dereference. | {'GHSA-c6jq-h4jp-72pr', 'CVE-2018-19802'} | 2021-08-25T04:29:55.989477Z | 2019-06-07T17:29:00Z | null | null | null | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYIKPYXZIWYWWNNORSKWRCFFCP6AFMRZ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OHIRMWW4JQ6UHJK4AVBJLFRLE2TPKC2W/', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00012.html', 'https://github.com/aubio/aubio/blob/0.4.9/ChangeLog', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00063.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00067.html', 'https://github.com/advisories/GHSA-c6jq-h4jp-72pr', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00003.html'} | null |
PyPI | GHSA-3jqw-crqj-w8qw | Moderate severity vulnerability that affects django | The verify_exists functionality in the URLField implementation in Django before 1.2.7 and 1.3.x before 1.3.1 relies on Python libraries that attempt access to an arbitrary URL with no timeout, which allows remote attackers to cause a denial of service (resource consumption) via a URL associated with (1) a slow response, (2) a completed TCP connection with no application data sent, or (3) a large amount of application data, a related issue to CVE-2011-1521. | {'CVE-2011-4137'} | 2022-03-03T05:14:13.564990Z | 2018-07-23T19:51:35Z | MODERATE | null | null | {'https://nvd.nist.gov/vuln/detail/CVE-2011-4137', 'https://www.djangoproject.com/weblog/2011/sep/09/', 'http://openwall.com/lists/oss-security/2011/09/13/2', 'https://www.djangoproject.com/weblog/2011/sep/10/127/', 'http://www.debian.org/security/2011/dsa-2332', 'http://openwall.com/lists/oss-security/2011/09/15/5', 'https://github.com/advisories/GHSA-3jqw-crqj-w8qw', 'http://openwall.com/lists/oss-security/2011/09/11/1', 'https://bugzilla.redhat.com/show_bug.cgi?id=737366', 'http://secunia.com/advisories/46614', 'https://hermes.opensuse.org/messages/14700881'} | null |
PyPI | PYSEC-2021-437 | null | A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1. | {'GHSA-5xp3-jfq3-5q8x', 'CVE-2021-3572'} | 2021-11-29T23:42:09.374676Z | 2021-11-10T18:15:00Z | null | null | null | {'https://bugzilla.redhat.com/show_bug.cgi?id=1962856', 'https://github.com/advisories/GHSA-5xp3-jfq3-5q8x'} | null |
PyPI | PYSEC-2021-572 | null | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in all binary cwise operations that don't require broadcasting (e.g., gradients of binary cwise operations). The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/cwise_ops_common.h#L264) assumes that the two inputs have exactly the same number of elements but does not check that. Hence, when the eigen functor executes it triggers heap OOB reads and undefined behavior due to binding to nullptr. We have patched the issue in GitHub commit 93f428fd1768df147171ed674fee1fc5ab8309ec. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'CVE-2021-37659', 'GHSA-q3g3-h9r4-prrc'} | 2021-12-09T06:35:04.007163Z | 2021-08-12T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q3g3-h9r4-prrc', 'https://github.com/tensorflow/tensorflow/commit/93f428fd1768df147171ed674fee1fc5ab8309ec'} | null |
PyPI | PYSEC-2014-73 | null | ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character. | {'CVE-2012-5486', 'GHSA-77hv-8796-8ccp'} | 2021-07-25T23:34:58.778006Z | 2014-09-30T14:55:00Z | null | null | null | {'https://plone.org/products/plone-hotfix/releases/20121106', 'https://bugs.launchpad.net/zope2/+bug/930812', 'https://github.com/advisories/GHSA-77hv-8796-8ccp', 'https://plone.org/products/plone/security/advisories/20121106/02', 'http://www.openwall.com/lists/oss-security/2012/11/10/1', 'http://rhn.redhat.com/errata/RHSA-2014-1194.html'} | null |
PyPI | PYSEC-2021-122 | null | If remote logging is not used, the worker (in the case of CeleryExecutor) or the scheduler (in the case of LocalExecutor) runs a Flask logging server and is listening on a specific port and also binds on 0.0.0.0 by default. This logging server had no authentication and allows reading log files of DAG jobs. This issue affects Apache Airflow < 2.1.2. | {'GHSA-m6h2-jx9v-58w6', 'CVE-2021-35936'} | 2021-08-24T14:30:45.545655Z | 2021-08-16T08:15:00Z | null | null | null | {'https://github.com/advisories/GHSA-m6h2-jx9v-58w6', 'https://lists.apache.org/thread.html/r53d6bd7b0a66f92ddaf1313282f10fec802e71246606dd30c16536df%40%3Cusers.airflow.apache.org%3E'} | null |
PyPI | GHSA-5xp3-jfq3-5q8x | Improper Input Validation in pip | A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1. | {'CVE-2021-3572'} | 2022-04-22T15:47:50.401286Z | 2021-11-15T17:45:01Z | MODERATE | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3572', 'https://bugzilla.redhat.com/show_bug.cgi?id=1962856', 'https://github.com/pypa/pip/pull/9827', 'https://packetstormsecurity.com/files/162712/USN-4961-1.txt', 'https://github.com/pypa/pip/commit/e46bdda9711392fec0c45c1175bae6db847cb30b', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://access.redhat.com/errata/RHSA-2021:3254', 'https://github.com/pypa/pip'} | null |
PyPI | GHSA-m342-ff57-4jcc | Heap OOB read in `tf.raw_ops.SparseCountSparseOutput` | ### Impact
The [shape inference functions for `SparseCountSparseOutput`](https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/ops/count_ops.cc#L43-L50) can trigger a read outside of bounds of heap allocated array:
```python
import tensorflow as tf
@tf.function
def func():
return tf.raw_ops.SparseCountSparseOutput(
indices=[1],
values=[[1]],
dense_shape=[10],
weights=[],
binary_output= True)
func()
```
The function fails to check that the first input (i.e., `indices`) has rank 2:
```cc
auto rank = c->Dim(c->input(0), 1);
```
### Patches
We have patched the issue in GitHub commit [701cfaca222a82afbeeb17496bd718baa65a67d2](https://github.com/tensorflow/tensorflow/commit/701cfaca222a82afbeeb17496bd718baa65a67d2).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-41210'} | 2022-03-03T05:14:12.419108Z | 2021-11-10T19:01:44Z | HIGH | null | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m342-ff57-4jcc', 'https://github.com/tensorflow/tensorflow/commit/701cfaca222a82afbeeb17496bd718baa65a67d2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41210'} | null |
PyPI | PYSEC-2018-50 | null | In SaltStack Salt before 2016.3.6, compromised salt-minions can impersonate the salt-master. | {'CVE-2017-7893'} | 2021-07-05T00:01:26.870701Z | 2018-04-23T22:29:00Z | null | null | null | {'https://docs.saltstack.com/en/2017.7/topics/releases/2016.3.6.html'} | null |
PyPI | PYSEC-2010-30 | null | Buffer overflow in Dan Pascu python-cjson 1.0.5, when UCS-4 encoding is enabled, allows context-dependent attackers to cause a denial of service (application crash) or possibly have unspecified other impact via vectors involving crafted Unicode input to the cjson.encode function. | {'CVE-2010-1666'} | 2021-08-27T03:22:17.891561Z | 2010-07-02T19:00:00Z | null | null | null | {'http://secunia.com/advisories/40500', 'http://www.vupen.com/english/advisories/2010/1774', 'http://secunia.com/advisories/40335', 'http://www.debian.org/security/2010/dsa-2068', 'https://bugs.launchpad.net/ubuntu/+source/python-cjson/+bug/585274'} | null |
PyPI | PYSEC-2021-821 | null | TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for `tf.ragged.cross` has an undefined behavior due to binding a reference to `nullptr`. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {'GHSA-vwhq-49r4-gj9v', 'CVE-2021-41214'} | 2021-12-09T06:35:43.281523Z | 2021-11-05T21:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vwhq-49r4-gj9v'} | null |
PyPI | GHSA-8h46-5m9h-7553 | Heap out of bounds write in `RaggedBinCount` | ### Impact
If the `splits` argument of `RaggedBincount` does not specify a valid [`SparseTensor`](https://www.tensorflow.org/api_docs/python/tf/sparse/SparseTensor), then an attacker can trigger a heap buffer overflow:
```python
import tensorflow as tf
tf.raw_ops.RaggedBincount(splits=[7,8], values= [5, 16, 51, 76, 29, 27, 54, 95],\
size= 59, weights= [0, 0, 0, 0, 0, 0, 0, 0],\
binary_output=False)
```
This will cause a read from outside the bounds of the `splits` tensor buffer in the [implementation of the `RaggedBincount` op](https://github.com/tensorflow/tensorflow/blob/8b677d79167799f71c42fd3fa074476e0295413a/tensorflow/core/kernels/bincount_op.cc#L430-L446):
```cc
for (int idx = 0; idx < num_values; ++idx) {
while (idx >= splits(batch_idx)) {
batch_idx++;
}
...
if (bin < size) {
if (binary_output_) {
out(batch_idx - 1, bin) = T(1);
} else {
T value = (weights_size > 0) ? weights(idx) : T(1);
out(batch_idx - 1, bin) += value;
}
}
}
```
Before the `for` loop, `batch_idx` is set to 0. The attacker sets `splits(0)` to be 7, hence the `while` loop does not execute and `batch_idx` remains 0. This then results in writing to `out(-1, bin)`, which is before the heap allocated buffer for the output tensor.
### Patches
We have patched the issue in GitHub commit [eebb96c2830d48597d055d247c0e9aebaea94cd5](https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 and TensorFlow 2.3.3, as these are also affected.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-29514'} | 2022-03-03T05:13:37.569995Z | 2021-05-21T14:20:51Z | LOW | null | {'CWE-787'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8h46-5m9h-7553', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29514', 'https://github.com/tensorflow/tensorflow/commit/eebb96c2830d48597d055d247c0e9aebaea94cd5'} | null |
PyPI | PYSEC-2020-122 | null | In Tensorflow before version 2.3.1, the `RaggedCountSparseOutput` does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the `splits` tensor has the minimum required number of elements. Code uses this quantity to initialize a different data structure. Since `BatchedMap` is equivalent to a vector, it needs to have at least one element to not be `nullptr`. If user passes a `splits` tensor that is empty or has exactly one element, we get a `SIGABRT` signal raised by the operating system. The issue is patched in commit 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and is released in TensorFlow version 2.3.1. | {'GHSA-x5cp-9pcf-pp3h', 'CVE-2020-15199'} | 2021-09-01T08:19:33.217572Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x5cp-9pcf-pp3h'} | null |
PyPI | GHSA-rqxg-xvcq-3v2f | Out-of-bounds Write in OpenCV | OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an out-of-bounds write error in the FillColorRow8 function in utils.cpp when reading an image file by using cv::imread. | {'CVE-2017-12605'} | 2022-03-03T05:14:20.940092Z | 2021-10-12T22:02:04Z | HIGH | null | {'CWE-787'} | {'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/issues/9309', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://security.gentoo.org/glsa/201712-02', 'https://github.com/xiaoqx/pocs/blob/master/opencv.md', 'https://github.com/opencv/opencv/pull/9376', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12605', 'https://github.com/opencv/opencv-python'} | null |
PyPI | GHSA-8qxj-f9rh-9fg2 | Improper Verification of Cryptographic Signature in Pure-Python ECDSA | A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create false transactions. | {'CVE-2019-14859'} | 2022-03-21T22:46:49.938331Z | 2020-04-01T16:35:26Z | CRITICAL | null | {'CWE-347'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-14859', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14859', 'https://pypi.org/project/ecdsa/0.13.3/', 'https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3', 'https://github.com/warner/python-ecdsa', 'https://github.com/warner/python-ecdsa/pull/115', 'https://github.com/warner/python-ecdsa/issues/114'} | null |
PyPI | PYSEC-2021-43 | null | Products.GenericSetup is a mini-framework for expressing the configured state of a Zope Site as a set of filesystem artifacts. In Products.GenericSetup before version 2.1.1 there is an information disclosure vulnerability - anonymous visitors may view log and snapshot files generated by the Generic Setup Tool. The problem has been fixed in version 2.1.1. Depending on how you have installed Products.GenericSetup, you should change the buildout version pin to 2.1.1 and re-run the buildout, or if you used pip simply do pip install `"Products.GenericSetup>=2.1.1"`. | {'GHSA-jff3-mwp3-f8cw', 'CVE-2021-21360'} | 2021-03-12T18:05:00Z | 2021-03-09T01:15:00Z | null | null | null | {'https://github.com/zopefoundation/Products.GenericSetup/commit/700319512b3615b3871a1f24e096cf66dc488c57', 'https://pypi.org/project/Products.GenericSetup/', 'https://github.com/zopefoundation/Products.GenericSetup/security/advisories/GHSA-jff3-mwp3-f8cw'} | null |
PyPI | PYSEC-2021-749 | null | TensorFlow is an end-to-end open source platform for machine learning. Sending invalid argument for `row_partition_types` of `tf.raw_ops.RaggedTensorToTensor` API results in a null pointer dereference and undefined behavior. The [implementation](https://github.com/tensorflow/tensorflow/blob/47a06f40411a69c99f381495f490536972152ac0/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L328) accesses the first element of a user supplied list of values without validating that the provided list is not empty. We have patched the issue in GitHub commit 301ae88b331d37a2a16159b65b255f4f9eb39314. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. | {'GHSA-hwr7-8gxx-fj5p', 'CVE-2021-37638'} | 2021-12-09T06:35:35.577694Z | 2021-08-12T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/301ae88b331d37a2a16159b65b255f4f9eb39314', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hwr7-8gxx-fj5p'} | null |
PyPI | PYSEC-2021-319 | null | An issue was discovered in views/list.py in GNU Mailman Postorius before 1.3.5. An attacker (logged into any account) can send a crafted POST request to unsubscribe any user from a mailing list, also revealing whether that address was subscribed in the first place. | {'CVE-2021-40347'} | 2021-09-10T20:31:12.904905Z | 2021-09-10T19:15:00Z | null | null | null | {'https://gitlab.com/mailman/postorius/-/tags', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993746', 'https://gitlab.com/mailman/postorius/-/issues/531', 'https://phabricator.wikimedia.org/T289798', 'https://gitlab.com/mailman/postorius/-/commit/3d880c56b58bc26b32eac0799407d74b64b7474b', 'https://www.debian.org/security/2021/dsa-4970'} | null |
PyPI | GHSA-j47f-4232-hvv8 | Heap out of bounds read in `RaggedCross` | ### Impact
An attacker can force accesses outside the bounds of heap allocated arrays by passing in invalid tensor values to `tf.raw_ops.RaggedCross`:
```python
import tensorflow as tf
ragged_values = []
ragged_row_splits = []
sparse_indices = []
sparse_values = []
sparse_shape = []
dense_inputs_elem = tf.constant([], shape=[92, 0], dtype=tf.int64)
dense_inputs = [dense_inputs_elem]
input_order = "R"
hashed_output = False
num_buckets = 0
hash_key = 0
tf.raw_ops.RaggedCross(ragged_values=ragged_values,
ragged_row_splits=ragged_row_splits,
sparse_indices=sparse_indices,
sparse_values=sparse_values,
sparse_shape=sparse_shape,
dense_inputs=dense_inputs,
input_order=input_order,
hashed_output=hashed_output,
num_buckets=num_buckets,
hash_key=hash_key,
out_values_type=tf.int64,
out_row_splits_type=tf.int64)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/efea03b38fb8d3b81762237dc85e579cc5fc6e87/tensorflow/core/kernels/ragged_cross_op.cc#L456-L487) lacks validation for the user supplied arguments:
```cc
int next_ragged = 0;
int next_sparse = 0;
int next_dense = 0;
for (char c : input_order_) {
if (c == 'R') {
TF_RETURN_IF_ERROR(BuildRaggedFeatureReader(
ragged_values_list[next_ragged], ragged_splits_list[next_ragged],
features));
next_ragged++;
} else if (c == 'S') {
TF_RETURN_IF_ERROR(BuildSparseFeatureReader(
sparse_indices_list[next_sparse], sparse_values_list[next_sparse],
batch_size, features));
next_sparse++;
} else if (c == 'D') {
TF_RETURN_IF_ERROR(
BuildDenseFeatureReader(dense_list[next_dense++], features));
}
...
}
```
Each of the above branches call a helper function after accessing array elements via a `*_list[next_*]` pattern, followed by incrementing the `next_*` index. However, as there is no validation that the `next_*` values are in the valid range for the corresponding `*_list` arrays, this results in heap OOB reads.
### Patches
We have patched the issue in GitHub commit [44b7f486c0143f68b56c34e2d01e146ee445134a](https://github.com/tensorflow/tensorflow/commit/44b7f486c0143f68b56c34e2d01e146ee445134a).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team. | {'CVE-2021-29532'} | 2022-03-03T05:12:53.744101Z | 2021-05-21T14:22:17Z | LOW | null | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j47f-4232-hvv8', 'https://github.com/tensorflow/tensorflow/commit/44b7f486c0143f68b56c34e2d01e146ee445134a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29532'} | null |
PyPI | PYSEC-2020-319 | null | In eager mode, TensorFlow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1 does not set the session state. Hence, calling `tf.raw_ops.GetSessionHandle` or `tf.raw_ops.GetSessionHandleV2` results in a null pointer dereference In linked snippet, in eager mode, `ctx->session_state()` returns `nullptr`. Since code immediately dereferences this, we get a segmentation fault. The issue is patched in commit 9a133d73ae4b4664d22bd1aa6d654fec13c52ee1, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. | {'GHSA-q8gv-q7wr-9jf8', 'CVE-2020-15204'} | 2021-12-09T06:35:13.891462Z | 2020-09-25T19:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q8gv-q7wr-9jf8', 'https://github.com/tensorflow/tensorflow/commit/9a133d73ae4b4664d22bd1aa6d654fec13c52ee1', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html'} | null |
PyPI | PYSEC-2017-34 | null | Salt before 2015.8.11 allows deleted minions to read or write to minions with the same id, related to caching. | {'CVE-2016-9639'} | 2021-07-05T00:01:26.392976Z | 2017-02-07T17:59:00Z | null | null | null | {'http://www.openwall.com/lists/oss-security/2016/11/25/2', 'https://docs.saltstack.com/en/2015.8/ref/configuration/master.html#rotate-aes-key', 'http://www.openwall.com/lists/oss-security/2016/11/25/3', 'http://www.securityfocus.com/bid/94553'} | null |
PyPI | PYSEC-2021-460 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can force accesses outside the bounds of heap allocated arrays by passing in invalid tensor values to `tf.raw_ops.RaggedCross`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/efea03b38fb8d3b81762237dc85e579cc5fc6e87/tensorflow/core/kernels/ragged_cross_op.cc#L456-L487) lacks validation for the user supplied arguments. Each of the above branches call a helper function after accessing array elements via a `*_list[next_*]` pattern, followed by incrementing the `next_*` index. However, as there is no validation that the `next_*` values are in the valid range for the corresponding `*_list` arrays, this results in heap OOB reads. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'CVE-2021-29532', 'GHSA-j47f-4232-hvv8'} | 2021-12-09T06:34:48.349137Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j47f-4232-hvv8', 'https://github.com/tensorflow/tensorflow/commit/44b7f486c0143f68b56c34e2d01e146ee445134a'} | null |
PyPI | GHSA-wjw6-2cqr-j4qr | Client metadata path-traversal | ### Impact
In both clients (`tuf/client` and `tuf/ngclient`), there is a path traversal vulnerability that in the worst case can overwrite files ending in `.json` anywhere on the client system on a call to `get_one_valid_targetinfo()`. It occurs because the rolename is used to form the filename, and may contain path traversal characters (ie `../../name.json`).
The impact is mitigated by a few facts:
* It only affects implementations that allow arbitrary rolename selection for delegated targets metadata
* The attack requires the ability to A) insert new metadata for the path-traversing role and B) get the role delegated by an existing targets metadata
* The written file content is heavily restricted since it needs to be a valid, signed targets file. The file extension is always .json.
### Patches
A fix is available in version 0.19 or newer.
### Workarounds
None that do not require code changes. Clients can restrict the allowed character set for rolenames, or they can store metadata in files named in a way that is not vulnerable: neither of these approaches is possible without modifying python-tuf.
### References
- [The issue where this was discovered](https://github.com/theupdateframework/python-tuf/issues/1527)
- [Proof of Concept demonstrating the flaw](https://github.com/jku/path-traversal-poc)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [python-tuf](https://github.com/theupdateframework/python-tuf/issues)
* Contact the maintainers by email or Slack
| {'CVE-2021-41131'} | 2022-03-03T05:13:15.399393Z | 2021-10-19T20:14:36Z | HIGH | null | {'CWE-22'} | {'https://github.com/theupdateframework/python-tuf/commit/4ad7ae48fda594b640139c3b7eae21ed5155a102', 'https://github.com/theupdateframework/python-tuf/issues/1527', 'https://github.com/theupdateframework/python-tuf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41131', 'https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr'} | null |
PyPI | GHSA-ffw3-6mp6-jmvj | Improper Access Control in Airflow | Improper Access Control on Configurations Endpoint for the Stable API of Apache Airflow allows users with Viewer or User role to get Airflow Configurations including sensitive information even when `[webserver] expose_config` is set to `False` in `airflow.cfg`. This allowed a privilege escalation attack. This issue affects Apache Airflow 2.0.0. | {'CVE-2021-26559'} | 2022-03-03T05:14:19.171338Z | 2021-04-07T21:05:57Z | MODERATE | null | {'CWE-284', 'CWE-269'} | {'https://lists.apache.org/thread.html/rd142565996d7ee847b9c14b8a9921dcf80bc6bc160e3d9dca6dfc2f8@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26559', 'https://lists.apache.org/thread.html/r3b3787700279ec361308cbefb7c2cce2acb26891a12ce864e4a13c8d%40%3Cusers.airflow.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/02/17/1', 'https://github.com/apache/airflow/blob/486b76438c0679682cf98cb88ed39c4b161cbcc8/CHANGELOG.txt'} | null |
PyPI | PYSEC-2019-133 | null | The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument. | {'GHSA-mh33-7rrq-662w', 'CVE-2019-11324'} | 2019-09-14T18:15:00Z | 2019-04-18T21:29:00Z | null | null | null | {'https://github.com/urllib3/urllib3/compare/a6ec68a...1efadf4', 'http://www.openwall.com/lists/oss-security/2019/04/19/1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOSA2NT4DUQDBEIWE6O7KKD24XND7TE2/', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00041.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NKGPJLVLVYCL4L4B4G5TIOTVK4BKPG72/', 'https://usn.ubuntu.com/3990-1/', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html', 'https://github.com/advisories/GHSA-mh33-7rrq-662w', 'https://access.redhat.com/errata/RHSA-2019:3335', 'https://access.redhat.com/errata/RHSA-2019:3590'} | null |
PyPI | PYSEC-2022-53 | null | Tensorflow is an Open Source Machine Learning Framework. The implementation of `UnravelIndex` is vulnerable to a division by zero caused by an integer overflow bug. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | {'GHSA-34f9-hjfq-rr8j', 'CVE-2022-21729'} | 2022-03-09T00:17:30.437565Z | 2022-02-03T13:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/58b34c6c8250983948b5a781b426f6aa01fd47af', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-34f9-hjfq-rr8j', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/unravel_index_op.cc#L36-L135'} | null |
PyPI | PYSEC-2020-175 | null | In PyInstaller before version 3.6, only on Windows, a local privilege escalation vulnerability is present in this particular case: If a software using PyInstaller in "onefile" mode is launched by a privileged user (at least more than the current one) which have his "TempPath" resolving to a world writable directory. This is the case for example if the software is launched as a service or as a scheduled task using a system account (TempPath will be C:\Windows\Temp). In order to be exploitable the software has to be (re)started after the attacker launch the exploit program, so for a service launched at startup, a service restart is needed (e.g. after a crash or an upgrade). | {'CVE-2019-16784', 'GHSA-7fcj-pq9j-wh2r'} | 2020-10-09T13:40:00Z | 2020-01-14T20:15:00Z | null | null | null | {'https://github.com/pyinstaller/pyinstaller/security/advisories/GHSA-7fcj-pq9j-wh2r'} | null |
PyPI | PYSEC-2020-81 | null | libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding integer overflow, related to realloc. | {'CVE-2020-5310', 'GHSA-vcqg-3p29-xw73'} | 2020-01-31T04:15:00Z | 2020-01-03T01:15:00Z | null | null | null | {'https://github.com/advisories/GHSA-vcqg-3p29-xw73', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/', 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html', 'https://usn.ubuntu.com/4272-1/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/', 'https://github.com/python-pillow/Pillow/commit/4e2def2539ec13e53a82e06c4b3daf00454100c4'} | null |
PyPI | GHSA-6g85-3hm8-83f9 | CHECK-fail in `QuantizeAndDequantizeV4Grad` | ### Impact
An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.QuantizeAndDequantizeV4Grad`:
```python
import tensorflow as tf
gradient_tensor = tf.constant([0.0], shape=[1])
input_tensor = tf.constant([0.0], shape=[1])
input_min = tf.constant([[0.0]], shape=[1, 1])
input_max = tf.constant([[0.0]], shape=[1, 1])
tf.raw_ops.QuantizeAndDequantizeV4Grad(
gradients=gradient_tensor, input=input_tensor,
input_min=input_min, input_max=input_max, axis=0)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/95078c145b5a7a43ee046144005f733092756ab5/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L162-L163) does not validate the rank of the `input_*` tensors. In turn, this results in the tensors being passes as they are to [`QuantizeAndDequantizePerChannelGradientImpl`](https://github.com/tensorflow/tensorflow/blob/95078c145b5a7a43ee046144005f733092756ab5/tensorflow/core/kernels/quantize_and_dequantize_op.h#L295-L306):
```cc
template <typename Device, typename T>
struct QuantizeAndDequantizePerChannelGradientImpl {
static void Compute(const Device& d,
typename TTypes<T, 3>::ConstTensor gradient,
typename TTypes<T, 3>::ConstTensor input,
const Tensor* input_min_tensor,
const Tensor* input_max_tensor,
typename TTypes<T, 3>::Tensor input_backprop,
typename TTypes<T>::Flat input_min_backprop,
typename TTypes<T>::Flat input_max_backprop) {
...
auto input_min = input_min_tensor->vec<T>();
auto input_max = input_max_tensor->vec<T>();
...
}
```
However, the `vec<T>` method, requires the rank to 1 and triggers a `CHECK` failure otherwise.
### Patches
We have patched the issue in GitHub commit [20431e9044cf2ad3c0323c34888b192f3289af6b](https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 as this is the only other affected version.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29544'} | 2022-03-03T05:13:03.019061Z | 2021-05-21T14:23:22Z | LOW | null | {'CWE-754'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6g85-3hm8-83f9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29544', 'https://github.com/tensorflow/tensorflow/commit/20431e9044cf2ad3c0323c34888b192f3289af6b'} | null |
PyPI | PYSEC-2021-175 | null | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a division by zero to occur in `Conv2DBackpropFilter`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/1b0296c3b8dd9bd948f924aa8cd62f87dbb7c3da/tensorflow/core/kernels/conv_grad_filter_ops.cc#L513-L522) computes a divisor based on user provided data (i.e., the shape of the tensors given as arguments). If all shapes are empty then `work_unit_size` is 0. Since there is no check for this case before division, this results in a runtime exception, with potential to be abused for a denial of service. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-j8qc-5fqr-52fp', 'CVE-2021-29538'} | 2021-08-27T03:22:28.180235Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8qc-5fqr-52fp'} | null |
PyPI | PYSEC-2014-24 | null | emitters.py in Django Piston before 0.2.3 and 0.2.x before 0.2.2.1 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method. | {'CVE-2011-4103', 'GHSA-pvhp-v9qp-xf5r'} | 2021-07-25T23:34:28.692113Z | 2014-10-27T01:55:00Z | null | null | null | {'http://www.openwall.com/lists/oss-security/2011/11/01/10', 'https://bitbucket.org/jespern/django-piston/commits/91bdaec89543/', 'https://www.djangoproject.com/weblog/2011/nov/01/piston-and-tastypie-security-releases/', 'https://bugzilla.redhat.com/show_bug.cgi?id=750658', 'http://www.debian.org/security/2011/dsa-2344', 'https://github.com/advisories/GHSA-pvhp-v9qp-xf5r'} | null |
PyPI | PYSEC-2021-525 | null | TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `SpaceToBatchNd` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/412c7d9bb8f8a762c5b266c9e73bfa165f29aac8/tensorflow/lite/kernels/space_to_batch_nd.cc#L82-L83). An attacker can craft a model such that one dimension of the `block` input is 0. Hence, the corresponding value in `block_shape` is 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | {'GHSA-v52p-hfjf-wg88', 'CVE-2021-29597'} | 2021-12-09T06:34:58.435866Z | 2021-05-14T20:15:00Z | null | null | null | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v52p-hfjf-wg88', 'https://github.com/tensorflow/tensorflow/commit/6d36ba65577006affb272335b7c1abd829010708'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.