CVE-2024-5998: LangChain pickle deserialization of untrusted data
(updated )
A vulnerability in the FAISS.deserialize_from_bytes
function of langchain-ai/langchain allows for pickle deserialization of untrusted data. This can lead to the execution of arbitrary commands via the os.system
function. The issue affects versions prior to 0.2.4.
References
- github.com/advisories/GHSA-f2jm-rw3h-6phg
- github.com/langchain-ai/langchain
- github.com/langchain-ai/langchain/commit/604dfe2d99246b0c09f047c604f0c63eafba31e7
- github.com/langchain-ai/langchain/commit/77209f315efd13442ec51c67719ba37dfaa44511
- huntr.com/bounties/fa3a2753-57c3-4e08-a176-d7a3ffda28fe
- nvd.nist.gov/vuln/detail/CVE-2024-5998
Code Behaviors & Features
Detect and mitigate CVE-2024-5998 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →