davidspek / kubeflownotebooks

Notebook Server Images for Kubeflow
9 stars 6 forks source link

CVE-2024-31580 (High) detected in torch-1.8.1-cp36-cp36m-manylinux1_x86_64.whl, torch-1.11.0-cp37-cp37m-manylinux1_x86_64.whl #805

Open mend-bolt-for-github[bot] opened 6 months ago

mend-bolt-for-github[bot] commented 6 months ago

CVE-2024-31580 - High Severity Vulnerability

Vulnerable Libraries - torch-1.8.1-cp36-cp36m-manylinux1_x86_64.whl, torch-1.11.0-cp37-cp37m-manylinux1_x86_64.whl

torch-1.8.1-cp36-cp36m-manylinux1_x86_64.whl

Tensors and Dynamic neural networks in Python with strong GPU acceleration

Library home page: https://files.pythonhosted.org/packages/dd/b9/824df420f6abf551e41bbaacbaa0be8321dc104f9f3803051513844dc310/torch-1.8.1-cp36-cp36m-manylinux1_x86_64.whl

Path to dependency file: /jupyter-pytorch/cuda-requirements.txt

Path to vulnerable library: /jupyter-pytorch/cuda-requirements.txt,/jupyter-pytorch/cuda-requirements.txt

Dependency Hierarchy: - :x: **torch-1.8.1-cp36-cp36m-manylinux1_x86_64.whl** (Vulnerable Library)

torch-1.11.0-cp37-cp37m-manylinux1_x86_64.whl

Tensors and Dynamic neural networks in Python with strong GPU acceleration

Library home page: https://files.pythonhosted.org/packages/94/32/96a0955e5d6ed8a837eda5ca095dd2694c4617cfa70ca599660cd5ff7447/torch-1.11.0-cp37-cp37m-manylinux1_x86_64.whl

Path to dependency file: /jupyter-pytorch-full/requirements.txt

Path to vulnerable library: /jupyter-pytorch-full/requirements.txt,/jupyter-pytorch-full/requirements.txt

Dependency Hierarchy: - :x: **torch-1.11.0-cp37-cp37m-manylinux1_x86_64.whl** (Vulnerable Library)

Found in HEAD commit: 513157c5d3f5743d53e228da1ec8289e92c92836

Found in base branch: master

Vulnerability Details

PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in the component /runtime/vararg_functions.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

Publish Date: 2024-04-17

URL: CVE-2024-31580

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2024-31580

Release Date: 2024-04-17

Fix Resolution: 2.2.0


Step up your Open Source Security Game with Mend here