PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerability in PyTorch's `weights_only` unpickler allows an attacker to craft a malicious checkpoint file (`.pth`) that, when loaded with `torch.load(..., weights_only=True)`, can corrupt memory and potentially lead to arbitrary code execution. Version 2.10.0 fixes the issue.
The CVE listing seems to have a patch attached, but I honestly can't tell if it fixes the CVE or not; it seems unrelated.
This is sadly distinct from CVE-2025-32434. Moreover, any vulns in weights_only=True are real security issues for our users - it's supposed to be a safe function.
This appears to hit F42 and F43 and F44 despite the RH bug filing. Delightful. :/ Unfortunately, both the commit and bug number provided in the NVD for this vuln seem unrelated. Luckily, I was able to find the patch: https://github.com/pytorch/pytorch/commit/0e2459f08fc5329979e6ad986014278f2a87618c