- 
                Notifications
    
You must be signed in to change notification settings  - Fork 0
 
Description
 Vulnerable Library - torch-2.8.0-cp310-none-macosx_11_0_arm64.whl
Tensors and Dynamic neural networks in Python with strong GPU acceleration
Library home page: https://files.pythonhosted.org/packages/ef/d6/e6d4c57e61c2b2175d3aafbfb779926a2cfd7c32eeda7c543925dceec923/torch-2.8.0-cp310-none-macosx_11_0_arm64.whl
Path to dependency file: /dev/requirements.txt
Path to vulnerable library: /tmp/ws-ua_20250911162230_THIROO/python_WJUNOV/202509111623321/env/lib/python3.9/site-packages/torch-2.8.0.dist-info,/tmp/ws-ua_20250911162230_THIROO/python_WJUNOV/20250911162252/torch-2.8.0-cp39-cp39-manylinux_2_28_x86_64.whl
Found in HEAD commit: eb4a123ac71f425039cbf2b066115e480b3e6cc6
Vulnerabilities
| Vulnerability | Severity | Dependency | Type | Fixed in (torch version) | Remediation Possible** | |
|---|---|---|---|---|---|---|
| CVE-2025-55552 | 5.3 | torch-2.8.0-cp310-none-macosx_11_0_arm64.whl | Direct | N/A | ❌ | 
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
 CVE-2025-55552
Vulnerable Library - torch-2.8.0-cp310-none-macosx_11_0_arm64.whl
Tensors and Dynamic neural networks in Python with strong GPU acceleration
Library home page: https://files.pythonhosted.org/packages/ef/d6/e6d4c57e61c2b2175d3aafbfb779926a2cfd7c32eeda7c543925dceec923/torch-2.8.0-cp310-none-macosx_11_0_arm64.whl
Path to dependency file: /dev/requirements.txt
Path to vulnerable library: /tmp/ws-ua_20250911162230_THIROO/python_WJUNOV/202509111623321/env/lib/python3.9/site-packages/torch-2.8.0.dist-info,/tmp/ws-ua_20250911162230_THIROO/python_WJUNOV/20250911162252/torch-2.8.0-cp39-cp39-manylinux_2_28_x86_64.whl
Dependency Hierarchy:
- ❌ torch-2.8.0-cp310-none-macosx_11_0_arm64.whl (Vulnerable Library)
 
Found in HEAD commit: eb4a123ac71f425039cbf2b066115e480b3e6cc6
Found in base branch: master
Vulnerability Details
pytorch v2.8.0 was discovered to display unexpected behavior when the components torch.rot90 and torch.randn_like are used together.
Publish Date: 2025-09-25
URL: CVE-2025-55552
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
 - Attack Complexity: Low
 - Privileges Required: None
 - User Interaction: None
 - Scope: Unchanged
 
 - Impact Metrics:
- Confidentiality Impact: None
 - Integrity Impact: None
 - Availability Impact: Low