Critical severity9.8OSV Advisory· Published Aug 7, 2025· Updated Apr 15, 2026
CVE-2025-30405
CVE-2025-30405
Description
An integer overflow vulnerability in the loading of ExecuTorch models can cause objects to be placed outside their allocated memory area, potentially resulting in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit 0830af8207240df8d7f35b984cdf8bc35d74fa73.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
executorchPyPI | < 0.7.0 | 0.7.0 |
org.pytorch:executorch-androidMaven | < 0.7.0 | 0.7.0 |
github.com/pytorch/executorchSwiftURL | < 0.7.0 | 0.7.0 |
Affected products
1- Range: ciflow/binaries/all/sdym, ciflow/binaries/sdym, stable-2023-08-01, …
Patches
10830af820724Integer overflow in HierarchicalAllocator::get_offset_address()
1 file changed · +10 −0
runtime/core/hierarchical_allocator.h+10 −0 modified@@ -60,13 +60,23 @@ class HierarchicalAllocator final { uint32_t memory_id, size_t offset_bytes, size_t size_bytes) { + // Check for integer overflow in offset_bytes + size_bytes. + ET_CHECK_OR_RETURN_ERROR( + size_bytes <= SIZE_MAX - offset_bytes, + InvalidArgument, + "Integer overflow in offset_bytes (%" ET_PRIsize_t + ") + size_bytes (%" ET_PRIsize_t ")", + offset_bytes, + size_bytes); + ET_CHECK_OR_RETURN_ERROR( memory_id < buffers_.size(), InvalidArgument, "id %" PRIu32 " >= %" ET_PRIsize_t, memory_id, buffers_.size()); Span<uint8_t> buffer = buffers_[memory_id]; + ET_CHECK_OR_RETURN_ERROR( offset_bytes + size_bytes <= buffer.size(), MemoryAllocationFailed,
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.