Linux Foundation Pytorch
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Linux Foundation Pytorch.
By the Year
In 2026 there have been 0 vulnerabilities in Linux Foundation Pytorch. Last year, in 2025 Pytorch had 9 security vulnerabilities published. Right now, Pytorch is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 9 | 5.13 |
| 2024 | 4 | 9.80 |
| 2023 | 0 | 0.00 |
| 2022 | 1 | 9.80 |
It may take a day or so for new Pytorch vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Linux Foundation Pytorch Security Vulnerabilities
PyTorch RCE via torch.load weights_only=True <2.6.0
CVE-2025-32434
- April 18, 2025
PyTorch is a Python package that provides tensor computation with strong GPU acceleration and deep neural networks built on a tape-based autograd system. In version 2.5.1 and prior, a Remote Command Execution (RCE) vulnerability exists in PyTorch when loading a model using torch.load with weights_only=True. This issue has been patched in version 2.6.0.
Marshaling, Unmarshaling
PyTorch 2.6.0 ctc_loss Local DoS Vulnerability
CVE-2025-3730
5.5 - Medium
- April 16, 2025
A vulnerability, which was classified as problematic, was found in PyTorch 2.6.0. Affected is the function torch.nn.functional.ctc_loss of the file aten/src/ATen/native/LossCTC.cpp. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 46fc5d8e360127361211cb237d5f9eef0223e567. It is recommended to apply a patch to fix this issue. The security policy of the project warns to use unknown models which might establish malicious effects.
Improper Resource Shutdown or Release
PyTorch 2.6.0 Mem Corruption via caching_allocator_delete
CVE-2025-3136
3.3 - Low
- April 03, 2025
A vulnerability, which was classified as problematic, has been found in PyTorch 2.6.0. This issue affects the function torch.cuda.memory.caching_allocator_delete of the file c10/cuda/CUDACachingAllocator.cpp. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.
Memory Corruption
Memory Corruption via torch.jit.jit_module_from_flatbuffer (PyTorch 2.6.0)
CVE-2025-3121
5.5 - Medium
- April 02, 2025
A vulnerability classified as problematic has been found in PyTorch 2.6.0. Affected is the function torch.jit.jit_module_from_flatbuffer. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
Buffer Overflow
PyTorch 2.6.0 torch.lstm_cell Local MemCorrupt
CVE-2025-3001
5.3 - Medium
- March 31, 2025
A vulnerability classified as critical was found in PyTorch 2.6.0. This vulnerability affects the function torch.lstm_cell. The manipulation leads to memory corruption. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.
Buffer Overflow
PyTorch 2.6.0 Critical JIT Script Mem. Corruption
CVE-2025-3000
5.3 - Medium
- March 31, 2025
A vulnerability classified as critical has been found in PyTorch 2.6.0. This affects the function torch.jit.script. The manipulation leads to memory corruption. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.
Buffer Overflow
PyTorch 2.6.0 Critical Memory Corruption in torch.nn.utils.rnn.unpack_sequence
CVE-2025-2999
5.3 - Medium
- March 31, 2025
A vulnerability was found in PyTorch 2.6.0. It has been rated as critical. Affected by this issue is the function torch.nn.utils.rnn.unpack_sequence. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
Buffer Overflow
PyTorch 2.6.0 pad_packed_sequence Memory Corruption CVE-2025-2998
CVE-2025-2998
5.3 - Medium
- March 31, 2025
A vulnerability was found in PyTorch 2.6.0. It has been declared as critical. Affected by this vulnerability is the function torch.nn.utils.rnn.pad_packed_sequence. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
Buffer Overflow
PyTorch 2.6.0 (+cu124) torch.mkldnn_max_pool2d DoS
CVE-2025-2953
5.5 - Medium
- March 30, 2025
A vulnerability, which was classified as problematic, has been found in PyTorch 2.6.0+cu124. Affected by this issue is the function torch.mkldnn_max_pool2d. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The security policy of the project warns to use unknown models which might establish malicious effects.
Improper Resource Shutdown or Release
PyTorch <=2.4.1 RemoteModule Deserialization RCE
CVE-2024-48063
9.8 - Critical
- October 29, 2024
In PyTorch <=2.4.1, the RemoteModule has Deserialization RCE. NOTE: this is disputed by multiple parties because this is intended behavior in PyTorch distributed computing.
Marshaling, Unmarshaling
PyTorch <2.2.0 OOB Read via flatbuffer_loader.cpp
CVE-2024-31584
- April 19, 2024
Pytorch before v2.2.0 has an Out-of-bounds Read vulnerability via the component torch/csrc/jit/mobile/flatbuffer_loader.cpp.
UAF in torch/csrc/jit/mobile/interpreter.cpp before v2.2.0
CVE-2024-31583
- April 17, 2024
Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in torch/csrc/jit/mobile/interpreter.cpp.
Heap Buffer Overflow in PyTorch <=v2.2.0 vararg_functions.cpp DoS
CVE-2024-31580
- April 17, 2024
PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in the component /runtime/vararg_functions.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
PyTorch JIT Annotation Parser Arbitrary Code Execution via eval
CVE-2022-45907
9.8 - Critical
- November 26, 2022
In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary code execution because eval is used unsafely.
Code Injection
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Linux Foundation Pytorch or by Linux Foundation? Click the Watch button to subscribe.