CVE-2025-3730
CBL Mariner vulnerability analysis and mitigation

Overview

A vulnerability was discovered in PyTorch 2.6.0, specifically affecting the function torch.nn.functional.ctcloss in the file aten/src/ATen/native/LossCTC.cpp. The vulnerability was disclosed on April 16, 2025, and was assigned identifier CVE-2025-3730. The issue occurs when calling ctcloss with empty tensors on CUDA devices, leading to a floating point exception and subsequent denial of service (GitHub Issue, NVD).

Technical details

The vulnerability manifests when the ctc_loss function is called with empty tensors on CUDA devices, resulting in a floating point exception and program crash. This behavior differs from CPU execution, where proper error handling occurs. The issue has been assigned a CVSS v3.1 base score of 3.3 (LOW) with vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L, indicating local access is required for exploitation (VulDB).

Impact

The vulnerability leads to a denial of service condition when exploited, affecting the availability of systems using PyTorch 2.6.0 with CUDA devices. The impact is limited to local systems and does not affect confidentiality or integrity of the system (VulDB).

Mitigation and workarounds

A patch has been developed and merged to address this vulnerability. The fix involves adding proper input validation to check for empty tensors before processing. The patch is identified by commit hash 46fc5d8e360127361211cb237d5f9eef0223e567 (GitHub PR, Patch).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management