Joblib: Arbitrary Code Execution A vulnerability has been found in Joblib which allows for arbitrary code execution. joblib 2024-01-02 2024-01-02 873151 remote 1.2.0 1.2.0

Joblib is a set of tools to provide lightweight pipelining in Python. In particular: 1. transparent disk-caching of functions and lazy re-evaluation (memoize pattern) 2. easy simple parallel computing Joblib is optimized to be fast and robust on large data in particular and has specific optimizations for numpy arrays.

A vulnerability has been discovered in Joblib. Please review the CVE identifier referenced below for details.

Joblib is vulnerable to arbitrary code execution via the pre_dispatch flag in Parallel() class due to the eval() statement.

There is no known workaround at this time.

All Joblib users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-python/joblib-1.2.0"
CVE-2022-21797 graaff graaff