CVE-2022-0845: Code Injection in PyTorch Lightning
(updated )
PyTorch Lightning version 1.5.10 and prior is vulnerable to code injection. An attacker could execute commands on the target OS running the operating system by setting the PL_TRAINER_GPUS
when using the Trainer
module. A patch is included in the 1.6.0
release.
References
- github.com/PyTorchLightning/pytorch-lightning/pull/12212
- github.com/advisories/GHSA-r5qj-cvf9-p85h
- github.com/pypa/advisory-database/tree/main/vulns/pytorch-lightning/PYSEC-2022-181.yaml
- github.com/pytorchlightning/pytorch-lightning
- github.com/pytorchlightning/pytorch-lightning/commit/8b7a12c52e52a06408e9231647839ddb4665e8ae
- huntr.dev/bounties/a795bf93-c91e-4c79-aae8-f7d8bda92e2a
- nvd.nist.gov/vuln/detail/CVE-2022-0845
Detect and mitigate CVE-2022-0845 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →