CVE-2025-30405: ExecuTorch integer overflow vulnerability
9.8
Basic Information
Technical Details
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| executorch | pip | < 0.7.0 | 0.7.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The analysis of the provided vulnerability information and the associated commit 0830af8207240df8d7f35b984cdf8bc35d74fa73 directly points to the vulnerable function. The commit message explicitly states, "Integer overflow in HierarchicalAllocator::get_offset_address()". The patch applied to runtime/core/hierarchical_allocator.h introduces a check to prevent an integer overflow before a memory allocation check. This confirms that the get_offset_address function within the torch::executor::HierarchicalAllocator class was the location of the vulnerability. The vulnerability lies in the fact that without the added check, an attacker could provide a specially crafted model that causes offset_bytes + size_bytes to overflow, leading to an out-of-bounds write and potential code execution. Therefore, the identified function torch::executor::HierarchicalAllocator::get_offset_address is the precise location of the vulnerability.