parlai is a framework for training and evaluating AI models on a variety of openly available dialogue datasets. In affected versions the package is vulnerable to YAML deserialization attack caused by unsafe loading which leads to Arbitary code execution. This security bug is patched by avoiding unsafe loader users should update to version above v1.1.0. If upgrading is not possible then users can change the Loader used to SafeLoader as a workaround. See commit 507d066ef432ea27d3e201da08009872a2f37725 for details.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-0165 parlai is a framework for training and evaluating AI models on a variety of openly available dialogue datasets. In affected versions the package is vulnerable to YAML deserialization attack caused by unsafe loading which leads to Arbitary code execution. This security bug is patched by avoiding unsafe loader users should update to version above v1.1.0. If upgrading is not possible then users can change the Loader used to SafeLoader as a workaround. See commit 507d066ef432ea27d3e201da08009872a2f37725 for details.
Github GHSA Github GHSA GHSA-m87f-9fvv-2mgg Deserialization of Untrusted Data in parlai
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-04T01:58:18.337Z

Reserved: 2021-08-16T00:00:00

Link: CVE-2021-39207

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-09-10T23:15:07.343

Modified: 2024-11-21T06:18:54.097

Link: CVE-2021-39207

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.