Name | CVE-2025-55558 |
Description | A buffer overflow occurs in pytorch v2.7.0 when a PyTorch model consists of torch.nn.Conv2d, torch.nn.functional.hardshrink, and torch.Tensor.view-torch.mv() and is compiled by Inductor, leading to a Denial of Service (DoS). |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1116532 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
pytorch (PTS) | bullseye | 1.7.1-7 | vulnerable |
bookworm | 1.13.1+dfsg-4 | vulnerable | |
trixie | 2.6.0+dfsg-7 | vulnerable | |
forky, sid | 2.6.0+dfsg-9 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
pytorch | source | (unstable) | (unfixed) | 1116532 |
[trixie] - pytorch <no-dsa> (Minor issue)
[bookworm] - pytorch <no-dsa> (Minor issue)
https://github.com/pytorch/pytorch/issues/151523
https://github.com/pytorch/pytorch/pull/151887
https://github.com/pytorch/pytorch/commit/68a7501dabb147d9fe7f343a33e1b91bacd3682b (v2.8.0-rc1)
https://github.com/pytorch/pytorch/commit/1eea2c4fe35ffbdcbfccbeb7ac6c3ec02137385d (v2.9.0-rc1)