Bug 2439565
| Summary: | CVE-2026-2391 python-torch: qs's arrayLimit bypass in comma parsing allows denial of service [fedora-42] | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Jon Moroney <jmoroney> |
| Component: | python-torch | Assignee: | Tom.Rix |
| Status: | CLOSED NOTABUG | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | 42 | CC: | alexjnewt, lx, pbrobinson, rocm-packagers-sig, Tom.Rix |
| Target Milestone: | --- | Keywords: | Security, SecurityTracking |
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | {"flaws": ["4a358cb9-8ba0-450b-a156-3f1ac3210248"]} | ||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2026-04-13 01:14:33 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 2439353 | ||
|
Description
Jon Moroney
2026-02-12 22:15:17 UTC
This comes from the qs JavaScript library. I'm not really sure how this impacts PyTorch, but it must be present in one of our build inputs or outputs? I'm closing with the view that while this may be present in build inputs, as far as I am aware this JavaScript Library does not appear in the Python code or compiled objects output by our build process. |