Low severityNVD Advisory· Published Mar 30, 2025· Updated Apr 22, 2025
PyTorch torch.mkldnn_max_pool2d denial of service
CVE-2025-2953
Description
A vulnerability, which was classified as problematic, has been found in PyTorch 2.6.0+cu124. Affected by this issue is the function torch.mkldnn_max_pool2d. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The security policy of the project warns to use unknown models which might establish malicious effects.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
torchPyPI | < 2.7.1-rc1 | 2.7.1-rc1 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- github.com/pytorch/pytorch/issues/149274ghsaexploitissue-trackingWEB
- github.com/advisories/GHSA-3749-ghw9-m3mgghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-2953ghsaADVISORY
- vuldb.comghsathird-party-advisoryWEB
- github.com/pytorch/pytorch/blob/main/SECURITY.mdghsarelatedWEB
- github.com/pytorch/pytorch/issues/149274ghsaissue-trackingWEB
- vuldb.comghsasignaturepermissions-requiredWEB
- vuldb.comghsavdb-entrytechnical-descriptionWEB
News mentions
0No linked articles in our index yet.