Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2026/VULN079
_____________________________________________________________________

DATE                : 27/01/2026

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running PyTorch versions prior to 2.10.0.

=====================================================================
https://github.com/pytorch/pytorch/security/advisories/GHSA-63cw-57p8-fm3p
_____________________________________________________________________

Loading a malicious PyTorch checkpoint with weights_only=True can
result in arbitrary code execution

High
malfet published GHSA-63cw-57p8-fm3p Jan 26, 2026

Package
pytorch (pip)

Affected versions
<=2.9.1

Patched versions
>=2.10.0


Description

Summary

A vulnerability in PyTorch's weights_only unpickler allows an attacker
to craft a malicious checkpoint file (.pth) that, when loaded with
torch.load(..., weights_only=True), can corrupt memory and potentially
lead to arbitrary code execution.


Vulnerability Details

The weights_only=True unpickler failed to properly validate pickle
opcodes and storage metadata, allowing:

    Heap memory corruption via SETITEM/SETITEMS opcodes applied to
non-dictionary types
    Storage size mismatch between declared element count and actual
data in the archive

Impact

An attacker who can convince a user to load a malicious checkpoint
file may achieve arbitrary code execution in the context of the
victim's process.


Credit

Ji'an Zhou


Severity
High
8.8/ 10

CVSS v3 base metrics
Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE ID
CVE-2026-24747

Weaknesses
No CWEs

Credits

    @azraelxuemo azraelxuemo Reporter


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================




