Skip to content

CVE-2025-2148 (Medium) detected in torch-2.5.1-cp39-none-macosx_11_0_arm64.whl #463

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
mend-for-github-com bot opened this issue Mar 19, 2025 · 5 comments
Labels
Mend: dependency security vulnerability Security vulnerability detected by Mend untriaged

Comments

@mend-for-github-com
Copy link

CVE-2025-2148 - Medium Severity Vulnerability

Vulnerable Library - torch-2.5.1-cp39-none-macosx_11_0_arm64.whl

Tensors and Dynamic neural networks in Python with strong GPU acceleration

Library home page: https://files.pythonhosted.org/packages/25/07/3548a7cfcf69d0eccec2ee79ee3913f1cdaadb27b36946774db86729ee47/torch-2.5.1-cp39-none-macosx_11_0_arm64.whl

Path to dependency file: /requirements.txt

Path to vulnerable library: /requirements.txt

Dependency Hierarchy:

  • torch-2.5.1-cp39-none-macosx_11_0_arm64.whl (Vulnerable Library)

Found in HEAD commit: fca546cb0c3befa8a2ea52909690f598c18df050

Found in base branch: main

Vulnerability Details

A vulnerability was found in PyTorch 2.6.0+cu124. It has been declared as critical. Affected by this vulnerability is the function torch.ops.profiler._call_end_callbacks_on_jit_fut of the component Tuple Handler. The manipulation of the argument None leads to memory corruption. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult.

Publish Date: 2025-03-10

URL: CVE-2025-2148

CVSS 3 Score Details (5.0)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

@mend-for-github-com mend-for-github-com bot added the Mend: dependency security vulnerability Security vulnerability detected by Mend label Mar 19, 2025
@andrross
Copy link
Member

andrross commented Apr 7, 2025

Catch All Triage - 1

@andrross andrross removed the untriaged label Apr 7, 2025
@Yerzhaisang
Copy link
Collaborator

This vulnerability also existed in previous versions of Torch. We’ve upgraded to the latest version, but the issue is still present. I’m going to close this for now—feel free to reopen if needed.

@dhrubo-os
Copy link
Collaborator

@Yerzhaisang can't we upgrade the torch version?

@Yerzhaisang
Copy link
Collaborator

@dhrubo-os I think it's done here

@dhrubo-os
Copy link
Collaborator

Thanks for the reference.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Mend: dependency security vulnerability Security vulnerability detected by Mend untriaged
Projects
None yet
Development

No branches or pull requests

3 participants