
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical vulnerability was discovered in PyTorch version 2.6.0+cu124, identified as CVE-2025-2148. The vulnerability affects the function torch.ops.profiler.callendcallbacksonjitfut in the Tuple Handler component. The issue was disclosed on March 10, 2025, and involves memory corruption when manipulating the None argument (NVD, VulDB).
The vulnerability is classified as a memory corruption issue (CWE-119) where operations on a memory buffer can read from or write to memory locations outside the intended boundary. The vulnerability has received a CVSS v3.1 base score of 5.0 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L. The issue can be triggered by passing a tuple with None value to the affected function (VulDB, GitHub Issue).
The vulnerability affects confidentiality, integrity, and availability of the system. When exploited, it can lead to memory corruption, potentially causing system crashes or other undefined behavior. The attack can be launched remotely, though the complexity of exploitation is considered high (VulDB).
Currently, there are no known official mitigations or workarounds published for this vulnerability. It is suggested to consider replacing the affected component with an alternative solution until a patch is available (VulDB).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."