pytorch-lightning@0.2.5 vulnerabilities

PyTorch Lightning is the lightweight PyTorch wrapper for ML researchers. Scale your models. Write less boilerplate.

Direct Vulnerabilities

Known vulnerabilities in the pytorch-lightning package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Unrestricted Upload of File with Dangerous Type

pytorch-lightning is a lightweight PyTorch wrapper for ML researchers. Scale your models. Write less boilerplate.

Affected versions of this package are vulnerable to Unrestricted Upload of File with Dangerous Type through the /v1/runs API endpoint when extracting tar.gz files. An attacker can deploy the malicious tar.gz plugins that exploit path traversal vulnerabilities, allowing to write files to arbitrary locations on the victim's file system.

How to fix Unrestricted Upload of File with Dangerous Type?

Upgrade pytorch-lightning to version 2.4.0 or higher.

[0,2.4.0)
  • C
Improper Restriction of Operations within the Bounds of a Memory Buffer

pytorch-lightning is a lightweight PyTorch wrapper for ML researchers. Scale your models. Write less boilerplate.

Affected versions of this package are vulnerable to Improper Restriction of Operations within the Bounds of a Memory Buffer due to improper handling of deserialized user input and mismanagement of dunder attributes by the deepdiff library. An attacker can execute arbitrary code and manipulate application state by constructing a serialized delta that includes dunder attributes.

How to fix Improper Restriction of Operations within the Bounds of a Memory Buffer?

Upgrade pytorch-lightning to version 2.3.3 or higher.

[0,2.3.3)
  • H
Command Injection

pytorch-lightning is a lightweight PyTorch wrapper for ML researchers. Scale your models. Write less boilerplate.

Affected versions of this package are vulnerable to Command Injection by setting the PL_TRAINER_GPUS when using the Trainer module.

How to fix Command Injection?

Upgrade pytorch-lightning to version 1.6.0rc0 or higher.

[,1.6.0rc0)
  • H
Deserialization of Untrusted Data

pytorch-lightning is a lightweight PyTorch wrapper for ML researchers. Scale your models. Write less boilerplate.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data via saving.py functionality which is calling yaml.UnsafeLoader from pyyaml Python library which is not a secure method. Because of that, maliciously crafted yaml config file can cause code execution on the victim's machine.

How to fix Deserialization of Untrusted Data?

Upgrade pytorch-lightning to version 1.6.0rc0 or higher.

[,1.6.0rc0)
  • H
Arbitrary Shell Injection

pytorch-lightning is a lightweight PyTorch wrapper for ML researchers. Scale your models. Write less boilerplate.

Affected versions of this package are vulnerable to Arbitrary Shell Injection due to an insecure usage of shell=True.

How to fix Arbitrary Shell Injection?

Upgrade pytorch-lightning to version 0.9.0 or higher.

[,0.9.0)