A vulnerability was found in PyTorch 2.6.0. It has been declared as critical. Affected by this vulnerability is the function torch.nn.utils.rnn.pad_packed_sequence. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
History

Thu, 29 May 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Linuxfoundation
Linuxfoundation pytorch
CPEs cpe:2.3:a:linuxfoundation:pytorch:2.6.0:-:*:*:*:python:*:*
Vendors & Products Linuxfoundation
Linuxfoundation pytorch

Mon, 31 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 31 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in PyTorch 2.6.0. It has been declared as critical. Affected by this vulnerability is the function torch.nn.utils.rnn.pad_packed_sequence. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
Title PyTorch torch.nn.utils.rnn.pad_packed_sequence memory corruption
Weaknesses CWE-119
References
Metrics cvssV2_0

{'score': 4.3, 'vector': 'AV:L/AC:L/Au:S/C:P/I:P/A:P'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-03-31T14:00:12.169Z

Updated: 2025-03-31T15:27:27.537Z

Reserved: 2025-03-30T17:42:25.483Z

Link: CVE-2025-2998

cve-icon Vulnrichment

Updated: 2025-03-31T15:27:21.882Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-31T14:15:20.370

Modified: 2025-05-29T15:53:57.197

Link: CVE-2025-2998

cve-icon Redhat

No data.