ls1intum / Athena

A system to support (semi-)automated assessment of exercises, built on ls1intum/Athena
https://ls1intum.github.io/Athena/
6 stars 1 forks source link

torch-2.1.0-cp39-none-macosx_11_0_arm64.whl: 4 vulnerabilities (highest severity is: 9.8) #359

Open mend-bolt-for-github[bot] opened 1 week ago

mend-bolt-for-github[bot] commented 1 week ago
Vulnerable Library - torch-2.1.0-cp39-none-macosx_11_0_arm64.whl

Tensors and Dynamic neural networks in Python with strong GPU acceleration

Library home page: https://files.pythonhosted.org/packages/4c/53/f1e58e147df8601c963df4b15045631f7e3d3caa5973bdf4e54a5cf6834e/torch-2.1.0-cp39-none-macosx_11_0_arm64.whl

Path to dependency file: /modules/programming/module_programming_themisml/.ws-temp-WUCOXH-requirements.txt

Path to vulnerable library: /modules/programming/module_programming_themisml/.ws-temp-WUCOXH-requirements.txt

Found in HEAD commit: 2c2e4a13b710ceb8f65cd32664895e4278834389

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (torch version) Remediation Possible**
CVE-2024-48063 Critical 9.8 torch-2.1.0-cp39-none-macosx_11_0_arm64.whl Direct 2.5.0
CVE-2024-31584 High 7.5 torch-2.1.0-cp39-none-macosx_11_0_arm64.whl Direct 2.2.0
CVE-2024-31583 High 7.5 torch-2.1.0-cp39-none-macosx_11_0_arm64.whl Direct 2.2.0
CVE-2024-31580 High 7.5 torch-2.1.0-cp39-none-macosx_11_0_arm64.whl Direct 2.2.0

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2024-48063 ### Vulnerable Library - torch-2.1.0-cp39-none-macosx_11_0_arm64.whl

Tensors and Dynamic neural networks in Python with strong GPU acceleration

Library home page: https://files.pythonhosted.org/packages/4c/53/f1e58e147df8601c963df4b15045631f7e3d3caa5973bdf4e54a5cf6834e/torch-2.1.0-cp39-none-macosx_11_0_arm64.whl

Path to dependency file: /modules/programming/module_programming_themisml/.ws-temp-WUCOXH-requirements.txt

Path to vulnerable library: /modules/programming/module_programming_themisml/.ws-temp-WUCOXH-requirements.txt

Dependency Hierarchy: - :x: **torch-2.1.0-cp39-none-macosx_11_0_arm64.whl** (Vulnerable Library)

Found in HEAD commit: 2c2e4a13b710ceb8f65cd32664895e4278834389

Found in base branch: develop

### Vulnerability Details

In PyTorch <=2.4.1, the RemoteModule has Deserialization RCE. NOTE: this is disputed by multiple parties because this is intended behavior in PyTorch distributed computing.

Publish Date: 2024-10-29

URL: CVE-2024-48063

### CVSS 3 Score Details (9.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2024-48063

Release Date: 2024-10-29

Fix Resolution: 2.5.0

Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
CVE-2024-31584 ### Vulnerable Library - torch-2.1.0-cp39-none-macosx_11_0_arm64.whl

Tensors and Dynamic neural networks in Python with strong GPU acceleration

Library home page: https://files.pythonhosted.org/packages/4c/53/f1e58e147df8601c963df4b15045631f7e3d3caa5973bdf4e54a5cf6834e/torch-2.1.0-cp39-none-macosx_11_0_arm64.whl

Path to dependency file: /modules/programming/module_programming_themisml/.ws-temp-WUCOXH-requirements.txt

Path to vulnerable library: /modules/programming/module_programming_themisml/.ws-temp-WUCOXH-requirements.txt

Dependency Hierarchy: - :x: **torch-2.1.0-cp39-none-macosx_11_0_arm64.whl** (Vulnerable Library)

Found in HEAD commit: 2c2e4a13b710ceb8f65cd32664895e4278834389

Found in base branch: develop

### Vulnerability Details

Pytorch before v2.2.0 has an Out-of-bounds Read vulnerability via the component torch/csrc/jit/mobile/flatbuffer_loader.cpp.

Publish Date: 2024-04-19

URL: CVE-2024-31584

### CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2024-31584

Release Date: 2024-04-19

Fix Resolution: 2.2.0

Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
CVE-2024-31583 ### Vulnerable Library - torch-2.1.0-cp39-none-macosx_11_0_arm64.whl

Tensors and Dynamic neural networks in Python with strong GPU acceleration

Library home page: https://files.pythonhosted.org/packages/4c/53/f1e58e147df8601c963df4b15045631f7e3d3caa5973bdf4e54a5cf6834e/torch-2.1.0-cp39-none-macosx_11_0_arm64.whl

Path to dependency file: /modules/programming/module_programming_themisml/.ws-temp-WUCOXH-requirements.txt

Path to vulnerable library: /modules/programming/module_programming_themisml/.ws-temp-WUCOXH-requirements.txt

Dependency Hierarchy: - :x: **torch-2.1.0-cp39-none-macosx_11_0_arm64.whl** (Vulnerable Library)

Found in HEAD commit: 2c2e4a13b710ceb8f65cd32664895e4278834389

Found in base branch: develop

### Vulnerability Details

Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in torch/csrc/jit/mobile/interpreter.cpp.

Publish Date: 2024-04-17

URL: CVE-2024-31583

### CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2024-31583

Release Date: 2024-04-17

Fix Resolution: 2.2.0

Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
CVE-2024-31580 ### Vulnerable Library - torch-2.1.0-cp39-none-macosx_11_0_arm64.whl

Tensors and Dynamic neural networks in Python with strong GPU acceleration

Library home page: https://files.pythonhosted.org/packages/4c/53/f1e58e147df8601c963df4b15045631f7e3d3caa5973bdf4e54a5cf6834e/torch-2.1.0-cp39-none-macosx_11_0_arm64.whl

Path to dependency file: /modules/programming/module_programming_themisml/.ws-temp-WUCOXH-requirements.txt

Path to vulnerable library: /modules/programming/module_programming_themisml/.ws-temp-WUCOXH-requirements.txt

Dependency Hierarchy: - :x: **torch-2.1.0-cp39-none-macosx_11_0_arm64.whl** (Vulnerable Library)

Found in HEAD commit: 2c2e4a13b710ceb8f65cd32664895e4278834389

Found in base branch: develop

### Vulnerability Details

PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in the component /runtime/vararg_functions.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.

Publish Date: 2024-04-17

URL: CVE-2024-31580

### CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2024-31580

Release Date: 2024-04-17

Fix Resolution: 2.2.0

Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)