UBUNTU-CVE-2025-3121

Source
https://ubuntu.com/security/CVE-2025-3121
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-3121.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2025-3121
Related
Published
2025-04-02T22:15:00Z
Modified
2025-05-29T10:29:57Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability classified as problematic has been found in PyTorch 2.6.0. Affected is the function torch.jit.jitmodulefrom_flatbuffer. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.

References

Affected packages

Ubuntu:22.04:LTS / pytorch

Package

Name
pytorch
Purl
pkg:deb/ubuntu/pytorch@1.8.1-4?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.7.1-7
1.8.1-4

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.10 / pytorch

Package

Name
pytorch
Purl
pkg:deb/ubuntu/pytorch@2.4.1-1ubuntu1?arch=source&distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.1.2+dfsg-4ubuntu1
2.1.2+dfsg-4ubuntu2
2.4.1-1ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:25.04 / pytorch

Package

Name
pytorch
Purl
pkg:deb/ubuntu/pytorch@2.6.0+dfsg-5build1?arch=source&distro=plucky

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.4.1-1ubuntu1
2.4.1-1ubuntu3
2.5.1+dfsg-3
2.5.1+dfsg-4build1
2.5.1+dfsg-4build2
2.6.0+dfsg-3
2.6.0+dfsg-4
2.6.0+dfsg-5
2.6.0+dfsg-5build1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}