Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2024-35198

Publication date 19 July 2024

Last updated 14 November 2024


Ubuntu priority

TorchServe is a flexible and easy-to-use tool for serving and scaling PyTorch models in production. TorchServe 's check on allowed_urls configuration can be by-passed if the URL contains characters such as ".." but it does not prevent the model from being downloaded into the model store. Once a file is downloaded, it can be referenced without providing a URL the second time, which effectively bypasses the allowed_urls security check. Customers using PyTorch inference Deep Learning Containers (DLC) through Amazon SageMaker and EKS are not affected. This issue in TorchServe has been fixed by validating the URL without characters such as ".." before downloading see PR #3082. TorchServe release 0.11.0 includes the fix to address this vulnerability. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Read the notes from the security team

Status

Package Ubuntu Release Status
pytorch 24.10 oracular
Not affected
24.04 LTS noble Not in release
23.10 mantic Ignored end of life, was needs-triage
22.04 LTS jammy
Not affected
20.04 LTS focal Not in release

Notes


octagalland

The CVE seems to only affect TorchServe, which is a different python wheel.