Bug 2433612 (CVE-2026-24747) - CVE-2026-24747 pytorch: PyTorch: Arbitrary code execution via malicious checkpoint file loading
Summary: CVE-2026-24747 pytorch: PyTorch: Arbitrary code execution via malicious check...
Keywords:
Status: NEW
Alias: CVE-2026-24747
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2433773 2433776 2433774 2433775 2433777 2433778 2433779 2433780
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-01-27 22:02 UTC by OSIDB Bzimport
Modified: 2026-02-16 04:36 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-01-27 22:02:17 UTC
PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerability in PyTorch's `weights_only` unpickler allows an attacker to craft a malicious checkpoint file (`.pth`) that, when loaded with `torch.load(..., weights_only=True)`, can corrupt memory and potentially lead to arbitrary code execution. Version 2.10.0 fixes the issue.

Comment 2 Alexander Lent 2026-01-30 05:36:47 UTC
The CVE listing seems to have a patch attached, but I honestly can't tell if it fixes the CVE or not; it seems unrelated.

Comment 3 Alexander Lent 2026-02-16 04:35:57 UTC
This is sadly distinct from CVE-2025-32434. Moreover, any vulns in weights_only=True are real security issues for our users - it's supposed to be a safe function.

Comment 4 Alexander Lent 2026-02-16 04:36:55 UTC
This appears to hit F42 and F43 and F44 despite the RH bug filing. Delightful. :/

Unfortunately, both the commit and bug number provided in the NVD for this vuln seem unrelated.

Luckily, I was able to find the patch:
https://github.com/pytorch/pytorch/commit/0e2459f08fc5329979e6ad986014278f2a87618c


Note You need to log in before you can comment on or make changes to this bug.