A vulnerability, which was classified as problematic, was found in PyTorch 2.6.0. Affected is the function torch.nn.functional.ctc_loss of the file aten/src/ATen/native/LossCTC.cpp. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 46fc5d8e360127361211cb237d5f9eef0223e567. It is recommended to apply a patch to fix this issue. The security policy of the project warns to use unknown models which might establish malicious effects.
References
Link | Resource |
---|---|
https://github.com/pytorch/pytorch/issues/150835 | Exploit Issue Tracking Vendor Advisory |
https://github.com/pytorch/pytorch/issues/150835#issue-2979082232 | Exploit Issue Tracking Vendor Advisory |
https://github.com/pytorch/pytorch/pull/150981 | Issue Tracking Patch |
https://github.com/timocafe/tewart-pytorch/commit/46fc5d8e360127361211cb237d5f9eef0223e567 | Patch |
https://vuldb.com/?ctiid.305076 | Permissions Required VDB Entry |
https://vuldb.com/?id.305076 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.553645 | Third Party Advisory VDB Entry Exploit |
https://github.com/pytorch/pytorch/issues/150835 | Exploit Issue Tracking Vendor Advisory |
Configurations
History
28 May 2025, 17:35
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linuxfoundation pytorch
Linuxfoundation |
|
CPE | cpe:2.3:a:linuxfoundation:pytorch:2.6.0:-:*:*:*:python:*:* | |
References | () https://github.com/pytorch/pytorch/issues/150835 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://github.com/pytorch/pytorch/issues/150835#issue-2979082232 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://github.com/pytorch/pytorch/pull/150981 - Issue Tracking, Patch | |
References | () https://github.com/timocafe/tewart-pytorch/commit/46fc5d8e360127361211cb237d5f9eef0223e567 - Patch | |
References | () https://vuldb.com/?ctiid.305076 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.305076 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.553645 - Third Party Advisory, VDB Entry, Exploit |
22 May 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) A vulnerability, which was classified as problematic, was found in PyTorch 2.6.0. Affected is the function torch.nn.functional.ctc_loss of the file aten/src/ATen/native/LossCTC.cpp. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 46fc5d8e360127361211cb237d5f9eef0223e567. It is recommended to apply a patch to fix this issue. The security policy of the project warns to use unknown models which might establish malicious effects. |
17 Apr 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/pytorch/pytorch/issues/150835 - |
16 Apr 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-16 21:15
Updated : 2025-05-28 17:35
NVD link : CVE-2025-3730
Mitre link : CVE-2025-3730
CVE.ORG link : CVE-2025-3730
JSON object : View
Products Affected
linuxfoundation
- pytorch
CWE
CWE-404
Improper Resource Shutdown or Release