Improper Resource Shutdown or Release Affecting py3-torch-cuda-12.6 package, versions <2.7.1-r0


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.03% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-PY3TORCHCUDA126-10343279
  • published11 Jun 2025
  • disclosed30 Mar 2025

Introduced: 30 Mar 2025

CVE-2025-2953  (opens in a new tab)
CWE-404  (opens in a new tab)

How to fix?

Upgrade Chainguard py3-torch-cuda-12.6 to version 2.7.1-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream py3-torch-cuda-12.6 package and not the py3-torch-cuda-12.6 package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

A vulnerability, which was classified as problematic, has been found in PyTorch 2.6.0+cu124. Affected by this issue is the function torch.mkldnn_max_pool2d. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The security policy of the project warns to use unknown models which might establish malicious effects.

CVSS Base Scores

version 3.1