First published: Sun Mar 30 2025(Updated: )
A vulnerability, which was classified as problematic, has been found in PyTorch 2.6.0+cu124. Affected by this issue is the function torch.mkldnn_max_pool2d. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
PyTorch | >=2.6.0+cu124 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2953 is classified as a problematic vulnerability due to its potential to cause denial of service.
To mitigate CVE-2025-2953, upgrade to the latest version of PyTorch that addresses this vulnerability.
CVE-2025-2953 affects PyTorch version 2.6.0+cu124 and possibly earlier versions.
The attack associated with CVE-2025-2953 leads to a denial of service and must be approached locally.
CVE-2025-2953 specifically impacts the function torch.mkldnn_max_pool2d in PyTorch.