Malicious Package Affecting torchtriton package, versions [0,]


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Mature

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-TORCHTRITON-3188545
  • published4 Jan 2023
  • disclosed4 Jan 2023
  • creditUnknown

Introduced: 4 Jan 2023

Malicious CVE NOT AVAILABLE CWE-506  (opens in a new tab)

How to fix?

Avoid using all malicious instances of the torchtriton package.

Overview

torchtriton is a malicious package. This is a "dependency confusion" package, which means the package name is based on existing repositories, namespaces, or components, it aims to trick users into downloading a package that contains malicious code.

From December 25, 2022 and December 30, 2022 a malicious package was available on PyPI that tricked users into downloading it instead of the legitimate package from the PyTorch nightly package index. This package exfiltrated system and secret data from the victim machine.

You should verify that the package you are using has been downloaded from the PyTorch index and not PyPi - if this package was downloaded from the PyTorch index it should be safe to use.

References

CVSS Scores

version 3.1