CVE-2024-10190: Horovod Vulnerable to Command Injection
Horovod versions up to and including v0.28.1 are vulnerable to unauthenticated remote code execution. The vulnerability is due to improper handling of base64-encoded data in the ElasticRendezvousHandler
, a subclass of KVStoreHandler
. Specifically, the _put_value
method in ElasticRendezvousHandler
calls codec.loads_base64(value)
, which eventually invokes cloudpickle.loads(decoded)
. This allows an attacker to send a malicious pickle object via a PUT request, leading to arbitrary code execution on the server.
References
Detect and mitigate CVE-2024-10190 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →