Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. torch
  4. ›
  5. CVE-2024-7804

CVE-2024-7804: Withdrawn Advisory: PyTorch deserialization vulnerability

March 20, 2025 (updated April 2, 2025)

Withdrawn Advisory

This advisory has been withdrawn because it describes known functionality of PyTorch. This link is maintained to preserve external references.

Original Description

A deserialization vulnerability exists in the Pytorch RPC framework (torch.distributed.rpc) in pytorch/pytorch versions <=2.3.1. The vulnerability arises from the lack of security verification during the deserialization process of PythonUDF objects in pytorch/torch/distributed/rpc/internal.py. This flaw allows an attacker to execute arbitrary code remotely by sending a malicious serialized PythonUDF object, leading to remote code execution (RCE) on the master node.

References

  • github.com/advisories/GHSA-4vmg-rw8f-92f9
  • github.com/pytorch/pytorch
  • github.com/pytorch/pytorch/blob/27a14405d3b996d572ba18339410e29ec005c775/torch/distributed/rpc/internal.py
  • huntr.com/bounties/0e870eeb-f924-4054-8fac-d926b1fb7259
  • nvd.nist.gov/vuln/detail/CVE-2024-7804

Code Behaviors & Features

Detect and mitigate CVE-2024-7804 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 2.3.1

Solution

Unfortunately, there is no solution available yet.

Impact 9.8 CRITICAL

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-502: Deserialization of Untrusted Data

Source file

pypi/torch/CVE-2024-7804.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:46 +0000.