Open mend-bolt-for-github[bot] opened 3 months ago
Tensors and Dynamic neural networks in Python with strong GPU acceleration
Library home page: https://files.pythonhosted.org/packages/13/70/54e9fb010fe1547bc4774716f11ececb81ae5b306c05f090f4461ee13205/torch-1.5.0-cp36-cp36m-manylinux1_x86_64.whl
Path to dependency file: /pytorch-metric-learning
Path to vulnerable library: /pytorch-metric-learning
Dependency Hierarchy: - :x: **torch-1.5.0-cp36-cp36m-manylinux1_x86_64.whl** (Vulnerable Library)
Found in HEAD commit: 50a539d66e7a2f790cf8a8d8d1471993698c9adc
Found in base branch: master
Pytorch before v2.2.0 has an Out-of-bounds Read vulnerability via the component torch/csrc/jit/mobile/flatbuffer_loader.cpp.
Publish Date: 2024-04-19
URL: CVE-2024-31584
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2024-31584
Release Date: 2024-04-19
Fix Resolution: 2.2.0
Step up your Open Source Security Game with Mend here
CVE-2024-31584 - High Severity Vulnerability
Tensors and Dynamic neural networks in Python with strong GPU acceleration
Library home page: https://files.pythonhosted.org/packages/13/70/54e9fb010fe1547bc4774716f11ececb81ae5b306c05f090f4461ee13205/torch-1.5.0-cp36-cp36m-manylinux1_x86_64.whl
Path to dependency file: /pytorch-metric-learning
Path to vulnerable library: /pytorch-metric-learning
Dependency Hierarchy: - :x: **torch-1.5.0-cp36-cp36m-manylinux1_x86_64.whl** (Vulnerable Library)
Found in HEAD commit: 50a539d66e7a2f790cf8a8d8d1471993698c9adc
Found in base branch: master
Pytorch before v2.2.0 has an Out-of-bounds Read vulnerability via the component torch/csrc/jit/mobile/flatbuffer_loader.cpp.
Publish Date: 2024-04-19
URL: CVE-2024-31584
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2024-31584
Release Date: 2024-04-19
Fix Resolution: 2.2.0
Step up your Open Source Security Game with Mend here