Bug 2433612 (CVE-2026-24747) - CVE-2026-24747 pytorch: PyTorch: Arbitrary code execution via malicious checkpoint file loading
Summary: CVE-2026-24747 pytorch: PyTorch: Arbitrary code execution via malicious check...
Keywords:
Status: NEW
Alias: CVE-2026-24747
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2433773 2433776 2433774 2433775 2433777 2433778 2433779 2433780
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-01-27 22:02 UTC by OSIDB Bzimport
Modified: 2026-01-30 05:36 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-01-27 22:02:17 UTC
PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerability in PyTorch's `weights_only` unpickler allows an attacker to craft a malicious checkpoint file (`.pth`) that, when loaded with `torch.load(..., weights_only=True)`, can corrupt memory and potentially lead to arbitrary code execution. Version 2.10.0 fixes the issue.

Comment 2 Alexander Lent 2026-01-30 05:36:47 UTC
The CVE listing seems to have a patch attached, but I honestly can't tell if it fixes the CVE or not; it seems unrelated.


Note You need to log in before you can comment on or make changes to this bug.