| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| executorch | pip | < 0.7.0 | 0.7.0 |
The analysis of the provided vulnerability information and the associated commit 0830af8207240df8d7f35b984cdf8bc35d74fa73 directly points to the vulnerable function. The commit message explicitly states, "Integer overflow in HierarchicalAllocator::get_offset_address()". The patch applied to runtime/core/hierarchical_allocator.h introduces a check to prevent an integer overflow before a memory allocation check. This confirms that the get_offset_address function within the torch::executor::HierarchicalAllocator class was the location of the vulnerability. The vulnerability lies in the fact that without the added check, an attacker could provide a specially crafted model that causes offset_bytes + size_bytes to overflow, leading to an out-of-bounds write and potential code execution. Therefore, the identified function torch::executor::HierarchicalAllocator::get_offset_address is the precise location of the vulnerability.
Ongoing coverage of React2Shell