diff --git a/security/advisory/pdsa-2022-001.md b/security/advisory/pdsa-2022-001.md index 7b409020abb6bf3577769ea163157feeb1aaeab9..596b314e749cfb2266705deecb410068220c0940 100644 --- a/security/advisory/pdsa-2022-001.md +++ b/security/advisory/pdsa-2022-001.md @@ -1,5 +1,9 @@ ## PDSA-2022-001: OOB read in gather_tree +### CVE Number + +CVE-2022-46741 + ### Impact The PoC is as follows: diff --git a/security/advisory/pdsa-2022-001_cn.md b/security/advisory/pdsa-2022-001_cn.md index ce5f4e3cf4d58c78ba2692eaa03920fe019e257b..60e428e2adddf346fdc5701fd6f318150fe49280 100644 --- a/security/advisory/pdsa-2022-001_cn.md +++ b/security/advisory/pdsa-2022-001_cn.md @@ -1,5 +1,9 @@ ## PDSA-2022-001: OOB read in gather_tree +### CVE编号 + +CVE-2022-46741 + ### 影响 PoC如下: diff --git a/security/advisory/pdsa-2022-002.md b/security/advisory/pdsa-2022-002.md index efb8e931722bbf9a677e4423c29032b8b5c3740d..a3171eab747456fcfcd6048a98f9e802decb65c2 100644 --- a/security/advisory/pdsa-2022-002.md +++ b/security/advisory/pdsa-2022-002.md @@ -1,5 +1,9 @@ ## PDSA-2022-002: Code injection in paddle.audio.functional.get_window +### CVE Number + +CVE-2022-46742 + ### Impact `paddle.audio.functional.get_windowis` vulnerable to a code injection as it calls `eval` on user supplied `winstr`. This may lead to arbitrary code execution. diff --git a/security/advisory/pdsa-2022-002_cn.md b/security/advisory/pdsa-2022-002_cn.md index 84fc365fbbcd89c64de89c03dddeed2f9b191faf..f2d7ca9c865072a8e091ff52720863db265291fb 100644 --- a/security/advisory/pdsa-2022-002_cn.md +++ b/security/advisory/pdsa-2022-002_cn.md @@ -1,5 +1,9 @@ ## PDSA-2022-002: Code injection in paddle.audio.functional.get_window +### CVE编号 + +CVE-2022-46742 + ### 影响 `paddle.audio.functional.get_window`由于使用`eval`用户提供的参数`winstr`而存在代码注入漏洞,将导致任意代码执行。