Bug#1024903: pytorch: CVE-2022-45907: torch.jit.annotations.parse_type_line prone to command injection
Source: pytorch
Version: 1.12.1-1
Severity: important
Tags: upstream security
Forwarded: https://github.com/pytorch/pytorch/issues/88868
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
Control: found -1 1.7.1-7
Hi,
The following vulnerability was published for pytorch.
CVE-2022-45907[0]:
| In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line
| can cause arbitrary code execution because eval is used unsafely.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2022-45907
https://www.cve.org/CVERecord?id=CVE-2022-45907
[1] https://github.com/pytorch/pytorch/issues/88868
[2] https://github.com/pytorch/pytorch/commit/767f6aa49fe20a2766b9843d01e3b7f7793df6a3
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
Reply to: