[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1024903: pytorch: CVE-2022-45907: torch.jit.annotations.parse_type_line prone to command injection



Source: pytorch
Version: 1.12.1-1
Severity: important
Tags: upstream security
Forwarded: https://github.com/pytorch/pytorch/issues/88868
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
Control: found -1 1.7.1-7

Hi,

The following vulnerability was published for pytorch.

CVE-2022-45907[0]:
| In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line
| can cause arbitrary code execution because eval is used unsafely.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-45907
    https://www.cve.org/CVERecord?id=CVE-2022-45907
[1] https://github.com/pytorch/pytorch/issues/88868
[2] https://github.com/pytorch/pytorch/commit/767f6aa49fe20a2766b9843d01e3b7f7793df6a3

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore


Reply to: