First published: Wed Apr 16 2025(Updated: )
A vulnerability, which was classified as problematic, was found in PyTorch 2.6.0. Affected is the function torch.nn.functional.ctc_loss of the file aten/src/ATen/native/LossCTC.cpp. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The name of the patch is 46fc5d8e360127361211cb237d5f9eef0223e567. It is recommended to apply a patch to fix this issue.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
PyTorch | ||
pip/torch | <=2.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3730 is classified as a problematic vulnerability with the potential for a denial of service.
CVE-2025-3730 affects the function torch.nn.functional.ctc_loss in PyTorch and can lead to service disruptions.
CVE-2025-3730 requires local access to exploit, meaning it cannot be exploited remotely.
CVE-2025-3730 was reported in relation to PyTorch version 2.6.0.
To mitigate CVE-2025-3730, consider upgrading PyTorch to the latest version that addresses this vulnerability.