Vulnerability Description
In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary code execution because eval is used unsafely.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linuxfoundation | Pytorch | < 1.13.1 |
Related Weaknesses (CWE)
References
- https://github.com/pytorch/pytorch/commit/767f6aa49fe20a2766b9843d01e3b7f7793df6PatchThird Party Advisory
- https://github.com/pytorch/pytorch/issues/88868ExploitIssue TrackingPatch
- https://github.com/pytorch/pytorch/commit/767f6aa49fe20a2766b9843d01e3b7f7793df6PatchThird Party Advisory
- https://github.com/pytorch/pytorch/issues/88868ExploitIssue TrackingPatch
FAQ
What is CVE-2022-45907?
CVE-2022-45907 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary code execution because eval is used unsafely.
How severe is CVE-2022-45907?
CVE-2022-45907 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-45907?
Check the references section above for vendor advisories and patch information. Affected products include: Linuxfoundation Pytorch.