Buffer Overflow Affecting torch package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.02% (5th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-TORCH-10332645
  • published8 Jun 2025
  • disclosed31 Mar 2025
  • creditNikita Shulga

Introduced: 31 Mar 2025

CVE-2025-2999  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

There is no fixed version for torch.

Overview

torch is a Tensors and Dynamic neural networks in Python with strong GPU acceleration

Affected versions of this package are vulnerable to Buffer Overflow due to the unpack_sequence function. An attacker can corrupt memory by manipulating the function's input. This is only exploitable if the attacker has local access to the system.

References

CVSS Base Scores

version 4.0
version 3.1