| Title | pytorch PyTorch 2.10.0 Release deserialize |
|---|
| Description | This PR addresses a potential security vulnerability discovered during an analysis of the .pt2 loading mechanism. Currently, torch.export.load lacks a parameter to enforce secure deserialization. If a user unknowingly loads an untrusted .pt2 file that contains use_pickle: True in its weights config, or if the file triggers the exception fallback within deserialize_torch_artifact, the system implicitly falls back to using pickle (weights_only=False). This behavior introduces a significant risk of arbitrary code execution. |
|---|
| Source | ⚠️ https://github.com/pytorch/pytorch/pull/176791 |
|---|
| User | ez-lbz (UID 87033) |
|---|
| Submission | 03/07/2026 12:05 (2 months ago) |
|---|
| Moderation | 03/21/2026 09:13 (14 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 352326 [PyTorch 2.10.0 pt2 Loading deserialization] |
|---|
| Points | 20 |
|---|