First published: Sat Nov 26 2022(Updated: )
In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary code execution because eval is used unsafely.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Pytorch | <1.13.1 | |
pip/torch | <=1.13.0 | 1.13.1 |
<1.13.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-45907.
The severity of CVE-2022-45907 is critical (9.8).
Versions up to exclusive 1.13.1 of PyTorch are affected by CVE-2022-45907.
CVE-2022-45907 occurs due to the unsafe use of eval in torch.jit.annotations.parse_type_line.
To fix CVE-2022-45907, update PyTorch to a version beyond trunk/89695 or apply the necessary patches provided by the PyTorch team.