Source: pytorch Version: 2.6.0+dfsg-9 Severity: important Tags: security upstream Forwarded: https://github.com/pytorch/pytorch/issues/151523 X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for pytorch. CVE-2025-55558[0]: | A buffer overflow occurs in pytorch v2.7.0 when a PyTorch model | consists of torch.nn.Conv2d, torch.nn.functional.hardshrink, and | torch.Tensor.view-torch.mv() and is compiled by Inductor, leading to | a Denial of Service (DoS). If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-55558 https://www.cve.org/CVERecord?id=CVE-2025-55558 [1] https://github.com/pytorch/pytorch/issues/151523 [2] https://github.com/pytorch/pytorch/pull/151887 [3] https://github.com/pytorch/pytorch/commit/68a7501dabb147d9fe7f343a33e1b91bacd3682b [4] https://github.com/pytorch/pytorch/commit/1eea2c4fe35ffbdcbfccbeb7ac6c3ec02137385d Please adjust the affected versions in the BTS as needed. Regards, Salvatore