📦 Pytorch
by Linuxfoundation
🔍 What is Pytorch?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
A critical Remote Command Execution vulnerability exists in PyTorch when loading models with torch.load(weights_only=True). Attackers can craft malicious model files to execute arbitrary code on syste...
This vulnerability allows remote code execution through deserialization in PyTorch's RemoteModule feature. It affects users running PyTorch distributed computing with RemoteModule enabled. The vulnera...
A vulnerability in PyTorch's `weights_only` unpickler allows attackers to craft malicious checkpoint files (.pth) that, when loaded, can corrupt memory and potentially lead to arbitrary code execution...
CVE-2025-55552 is an integer overflow vulnerability in PyTorch v2.8.0 that occurs when torch.rot90 and torch.randn_like functions are used together, potentially causing memory corruption or crashes. T...
A vulnerability in PyTorch v2.7.0 causes a Name Error when models containing torch.cummin operations are compiled with Inductor, leading to Denial of Service (DoS). This affects applications using PyT...
A vulnerability in PyTorch's torch.linalg.lu component allows attackers to trigger a Denial of Service (DoS) through specific slice operations. This affects systems running PyTorch v2.8.0 where LU dec...
PyTorch versions before v2.2.0 contain a use-after-free vulnerability in the mobile interpreter component. This allows attackers to potentially execute arbitrary code or cause denial of service by man...
PyTorch v2.8.0 contains an integer overflow vulnerability in torch.nan_to_num-.long() that could allow memory corruption or denial of service. This affects users who process untrusted numerical data w...
This CVE describes an assertion error vulnerability in PyTorch's nn.Fold module when using the inductor compiler. The vulnerability can cause denial of service by crashing applications that use affect...
This CVE describes a vulnerability in PyTorch's torch.compile feature where FractionalMaxPool2d produces inconsistent results. This could lead to incorrect model outputs or training failures in machin...
A vulnerability in PyTorch's bitwise_right_shift function produces incorrect output when given out-of-bounds values for the 'other' argument. This could lead to incorrect calculations in machine learn...
This vulnerability in PyTorch versions before 3.7.0 affects the bernoulli_p decompose function, causing inconsistency with CPU implementations that negatively impacts dropout layers when fallback_rand...
A critical memory corruption vulnerability in PyTorch's torch.lstm_cell function allows local attackers to potentially execute arbitrary code or crash applications. This affects systems running PyTorc...