Withdrawn Advisory: PyTorch deserialization vulnerability
Critical severity
GitHub Reviewed
Published
Mar 20, 2025
to the GitHub Advisory Database
•
Updated Apr 2, 2025
Withdrawn
This advisory was withdrawn on Apr 2, 2025
Description
Published by the National Vulnerability Database
Mar 20, 2025
Published to the GitHub Advisory Database
Mar 20, 2025
Reviewed
Mar 21, 2025
Withdrawn
Apr 2, 2025
Last updated
Apr 2, 2025
Withdrawn Advisory
This advisory has been withdrawn because it describes known functionality of PyTorch. This link is maintained to preserve external references.
Original Description
A deserialization vulnerability exists in the Pytorch RPC framework (torch.distributed.rpc) in pytorch/pytorch versions <=2.3.1. The vulnerability arises from the lack of security verification during the deserialization process of PythonUDF objects in pytorch/torch/distributed/rpc/internal.py. This flaw allows an attacker to execute arbitrary code remotely by sending a malicious serialized PythonUDF object, leading to remote code execution (RCE) on the master node.
References