Vulnerability Description
A vulnerability was found in PyTorch 2.6.0. It has been rated as critical. Affected by this issue is the function torch.nn.utils.rnn.unpack_sequence. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linuxfoundation | Pytorch | 2.6.0 |
Related Weaknesses (CWE)
References
- https://github.com/pytorch/pytorch/issues/149622Issue TrackingVendor Advisory
- https://github.com/pytorch/pytorch/issues/149622#issue-2935495265Issue TrackingVendor Advisory
- https://vuldb.com/?ctiid.302048Permissions RequiredVDB Entry
- https://vuldb.com/?id.302048Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.524198Third Party AdvisoryVDB Entry
FAQ
What is CVE-2025-2999?
CVE-2025-2999 is a vulnerability with a CVSS score of 5.3 (MEDIUM). A vulnerability was found in PyTorch 2.6.0. It has been rated as critical. Affected by this issue is the function torch.nn.utils.rnn.unpack_sequence. The manipulation leads to memory corruption. Attac...
How severe is CVE-2025-2999?
CVE-2025-2999 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-2999?
Check the references section above for vendor advisories and patch information. Affected products include: Linuxfoundation Pytorch.