DEBIAN-CVE-2025-3136

Source
https://security-tracker.debian.org/tracker/CVE-2025-3136
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-3136.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2025-3136
Upstream
Published
2025-04-03T04:15:38.540Z
Modified
2025-11-17T04:32:26.428677Z
Severity
  • 4.8 (Medium) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

A vulnerability, which was classified as problematic, has been found in PyTorch 2.6.0. This issue affects the function torch.cuda.memory.cachingallocatordelete of the file c10/cuda/CUDACachingAllocator.cpp. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.

References

Affected packages

Debian:11 / pytorch

Package

Name
pytorch
Purl
pkg:deb/debian/pytorch?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.7.1-7
1.8.1-1
1.8.1-2
1.8.1-3
1.8.1-4
1.8.1-5
1.12.0~rc1-1
1.12.0-1
1.12.1-1
1.13.1+dfsg-1
1.13.1+dfsg-2
1.13.1+dfsg-3
1.13.1+dfsg-4
1.13.1+dfsg-5

2.*

2.0.1+dfsg-1~exp1
2.0.1+dfsg-1
2.0.1+dfsg-2
2.0.1+dfsg-4
2.0.1+dfsg-5
2.1.2+dfsg-1
2.1.2+dfsg-2
2.1.2+dfsg-4
2.4.1-1
2.4.1-3
2.4.1-4
2.5.0+dfsg-1
2.5.1+dfsg-1
2.5.1+dfsg-3
2.5.1+dfsg-4
2.6.0~rc9+dfsg-1~exp1
2.6.0+dfsg-1~exp1
2.6.0+dfsg-1
2.6.0+dfsg-2
2.6.0+dfsg-3
2.6.0+dfsg-4
2.6.0+dfsg-5
2.6.0+dfsg-7
2.6.0+dfsg-8
2.6.0+dfsg-9

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-3136.json"

Debian:12 / pytorch

Package

Name
pytorch
Purl
pkg:deb/debian/pytorch?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.13.1+dfsg-4
1.13.1+dfsg-5

2.*

2.0.1+dfsg-1~exp1
2.0.1+dfsg-1
2.0.1+dfsg-2
2.0.1+dfsg-4
2.0.1+dfsg-5
2.1.2+dfsg-1
2.1.2+dfsg-2
2.1.2+dfsg-4
2.4.1-1
2.4.1-3
2.4.1-4
2.5.0+dfsg-1
2.5.1+dfsg-1
2.5.1+dfsg-3
2.5.1+dfsg-4
2.6.0~rc9+dfsg-1~exp1
2.6.0+dfsg-1~exp1
2.6.0+dfsg-1
2.6.0+dfsg-2
2.6.0+dfsg-3
2.6.0+dfsg-4
2.6.0+dfsg-5
2.6.0+dfsg-7
2.6.0+dfsg-8
2.6.0+dfsg-9

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-3136.json"

Debian:13 / pytorch

Package

Name
pytorch
Purl
pkg:deb/debian/pytorch?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.6.0+dfsg-7
2.6.0+dfsg-8
2.6.0+dfsg-9

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-3136.json"

Debian:14 / pytorch

Package

Name
pytorch
Purl
pkg:deb/debian/pytorch?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.6.0+dfsg-7
2.6.0+dfsg-8
2.6.0+dfsg-9

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-3136.json"