CVE-2023-23930: Pickle serialization vulnerable to Deserialization of Untrusted Data
(updated )
All users of vantage6 that post tasks with algorithms that use the default serialization. The default serialization is used by default with all algorithm wrappers.
References
- github.com/advisories/GHSA-5m22-cfq9-86x6
- github.com/pypa/advisory-database/tree/main/vulns/vantage6/PYSEC-2023-196.yaml
- github.com/vantage6/vantage6
- github.com/vantage6/vantage6/blob/0682c4288f43fee5bcc72dc448cdd99bd7e57f76/docs/release_notes.rst
- github.com/vantage6/vantage6/commit/e62f03bacf2247bd59eed217e2e7338c3a01a5f0
- github.com/vantage6/vantage6/security/advisories/GHSA-5m22-cfq9-86x6
- medium.com/ochrona/python-pickle-is-notoriously-insecure-d6651f1974c9
- nvd.nist.gov/vuln/detail/CVE-2023-23930
Detect and mitigate CVE-2023-23930 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →