Joblib: Arbitrary Code Execution — GLSA 202401-01

A vulnerability has been found in Joblib which allows for arbitrary code execution.

Affected packages

dev-python/joblib on all architectures
Affected versions < 1.2.0
Unaffected versions >= 1.2.0

Background

Joblib is a set of tools to provide lightweight pipelining in Python. In particular: 1. transparent disk-caching of functions and lazy re-evaluation (memoize pattern) 2. easy simple parallel computing Joblib is optimized to be fast and robust on large data in particular and has specific optimizations for numpy arrays.

Description

A vulnerability has been discovered in Joblib. Please review the CVE identifier referenced below for details.

Impact

Joblib is vulnerable to arbitrary code execution via the pre_dispatch flag in Parallel() class due to the eval() statement.

Workaround

There is no known workaround at this time.

Resolution

All Joblib users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-python/joblib-1.2.0"
 

References

Release date
January 02, 2024

Latest revision
January 02, 2024: 1

Severity
high

Exploitable
remote

Bugzilla entries