| Título | pytorch PyTorch 2.10.0 Release deserialize |
|---|
| Descripción | This PR addresses a potential security vulnerability discovered during an analysis of the .pt2 loading mechanism. Currently, torch.export.load lacks a parameter to enforce secure deserialization. If a user unknowingly loads an untrusted .pt2 file that contains use_pickle: True in its weights config, or if the file triggers the exception fallback within deserialize_torch_artifact, the system implicitly falls back to using pickle (weights_only=False). This behavior introduces a significant risk of arbitrary code execution. |
|---|
| Fuente | ⚠️ https://github.com/pytorch/pytorch/pull/176791 |
|---|
| Usuario | ez-lbz (UID 87033) |
|---|
| Sumisión | 2026-03-07 12:05 (hace 2 meses) |
|---|
| Moderación | 2026-03-21 09:13 (14 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 352326 [PyTorch 2.10.0 pt2 Loading escalada de privilegios] |
|---|
| Puntos | 20 |
|---|