Enviar #774681: pytorch PyTorch 2.10.0 Release deserializeinformación

Títulopytorch PyTorch 2.10.0 Release deserialize
DescripciónThis PR addresses a potential security vulnerability discovered during an analysis of the .pt2 loading mechanism. Currently, torch.export.load lacks a parameter to enforce secure deserialization. If a user unknowingly loads an untrusted .pt2 file that contains use_pickle: True in its weights config, or if the file triggers the exception fallback within deserialize_torch_artifact, the system implicitly falls back to using pickle (weights_only=False). This behavior introduces a significant risk of arbitrary code execution.
Fuente⚠️ https://github.com/pytorch/pytorch/pull/176791
Usuario
 ez-lbz (UID 87033)
Sumisión2026-03-07 12:05 (hace 2 meses)
Moderación2026-03-21 09:13 (14 days later)
EstadoAceptado
Entrada de VulDB352326 [PyTorch 2.10.0 pt2 Loading escalada de privilegios]
Puntos20

Do you want to use VulDB in your project?

Use the official API to access entries easily!