Debian Pytorch vulnerabilities

32 known vulnerabilities affecting debian/pytorch.

Total CVEs
32
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH8MEDIUM18LOW4

Vulnerabilities

Page 1 of 2
CVE-2026-24747HIGHCVSS 8.82026
CVE-2026-24747 [HIGH] CVE-2026-24747: pytorch - PyTorch is a Python package that provides tensor computation. Prior to version 2... PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerability in PyTorch's `weights_only` unpickler allows an attacker to craft a malicious checkpoint file (`.pth`) that, when loaded with `torch.load(..., weights_only=True)`, can corrupt memory and potentially lead to arbitrary code execution. Version 2.10.0 fixes the issue.
debian
CVE-2026-4538MEDIUMCVSS 4.82026
CVE-2026-4538 [MEDIUM] CVE-2026-4538: pytorch - A vulnerability was identified in PyTorch 2.10.0. The affected element is an unk... A vulnerability was identified in PyTorch 2.10.0. The affected element is an unknown function of the component pt2 Loading Handler. The manipulation leads to deserialization. The attack can only be performed from a local environment. The exploit is publicly available and might be used. The project was informed of the problem early through a pull request but has not
debian
CVE-2025-32434CRITICALCVSS 9.3fixed in pytorch 1.7.1-7+deb11u1 (bullseye)2025
CVE-2025-32434 [CRITICAL] CVE-2025-32434: pytorch - PyTorch is a Python package that provides tensor computation with strong GPU acc... PyTorch is a Python package that provides tensor computation with strong GPU acceleration and deep neural networks built on a tape-based autograd system. In version 2.5.1 and prior, a Remote Command Execution (RCE) vulnerability exists in PyTorch when loading a model using torch.load with weights_only=True. This issue has been patched in version 2.6.0. Scope: lo
debian
CVE-2025-55558HIGHCVSS 7.52025
CVE-2025-55558 [HIGH] CVE-2025-55558: pytorch - A buffer overflow occurs in pytorch v2.7.0 when a PyTorch model consists of torc... A buffer overflow occurs in pytorch v2.7.0 when a PyTorch model consists of torch.nn.Conv2d, torch.nn.functional.hardshrink, and torch.Tensor.view-torch.mv() and is compiled by Inductor, leading to a Denial of Service (DoS). Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-55551HIGHCVSS 7.52025
CVE-2025-55551 [HIGH] CVE-2025-55551: pytorch - An issue in the component torch.linalg.lu of pytorch v2.8.0 allows attackers to ... An issue in the component torch.linalg.lu of pytorch v2.8.0 allows attackers to cause a Denial of Service (DoS) when performing a slice operation. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-55557HIGHCVSS 7.52025
CVE-2025-55557 [HIGH] CVE-2025-55557: pytorch - A Name Error occurs in pytorch v2.7.0 when a PyTorch model consists of torch.cum... A Name Error occurs in pytorch v2.7.0 when a PyTorch model consists of torch.cummin and is compiled by Inductor, leading to a Denial of Service (DoS). Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-55553HIGHCVSS 7.52025
CVE-2025-55553 [HIGH] CVE-2025-55553: pytorch - A syntax error in the component proxy_tensor.py of pytorch v2.7.0 allows attacke... A syntax error in the component proxy_tensor.py of pytorch v2.7.0 allows attackers to cause a Denial of Service (DoS). Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-55552HIGHCVSS 7.52025
CVE-2025-55552 [HIGH] CVE-2025-55552: pytorch - pytorch v2.8.0 was discovered to display unexpected behavior when the components... pytorch v2.8.0 was discovered to display unexpected behavior when the components torch.rot90 and torch.randn_like are used together. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-55560HIGHCVSS 7.52025
CVE-2025-55560 [HIGH] CVE-2025-55560: pytorch - An issue in pytorch v2.7.0 can lead to a Denial of Service (DoS) when a PyTorch ... An issue in pytorch v2.7.0 can lead to a Denial of Service (DoS) when a PyTorch model consists of torch.Tensor.to_sparse() and torch.Tensor.to_dense() and is compiled by Inductor. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-3001MEDIUMCVSS 4.82025
CVE-2025-3001 [MEDIUM] CVE-2025-3001: pytorch - A vulnerability classified as critical was found in PyTorch 2.6.0. This vulnerab... A vulnerability classified as critical was found in PyTorch 2.6.0. This vulnerability affects the function torch.lstm_cell. The manipulation leads to memory corruption. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-46153MEDIUMCVSS 5.32025
CVE-2025-46153 [MEDIUM] CVE-2025-46153: pytorch - PyTorch before 3.7.0 has a bernoulli_p decompose function in decompositions.py e... PyTorch before 3.7.0 has a bernoulli_p decompose function in decompositions.py even though it lacks full consistency with the eager CPU implementation, negatively affecting nn.Dropout1d, nn.Dropout2d, and nn.Dropout3d for fallback_random=True. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-46152MEDIUMCVSS 5.32025
CVE-2025-46152 [MEDIUM] CVE-2025-46152: pytorch - In PyTorch before 2.7.0, bitwise_right_shift produces incorrect output for certa... In PyTorch before 2.7.0, bitwise_right_shift produces incorrect output for certain out-of-bounds values of the "other" argument. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-3730MEDIUMCVSS 4.82025
CVE-2025-3730 [MEDIUM] CVE-2025-3730: pytorch - A vulnerability, which was classified as problematic, was found in PyTorch 2.6.0... A vulnerability, which was classified as problematic, was found in PyTorch 2.6.0. Affected is the function torch.nn.functional.ctc_loss of the file aten/src/ATen/native/LossCTC.cpp. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The real existence of this vulnerabilit
debian
CVE-2025-46148MEDIUMCVSS 5.32025
CVE-2025-46148 [MEDIUM] CVE-2025-46148: pytorch - In PyTorch through 2.6.0, when eager is used, nn.PairwiseDistance(p=2) produces ... In PyTorch through 2.6.0, when eager is used, nn.PairwiseDistance(p=2) produces incorrect results. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian
CVE-2025-3121MEDIUMCVSS 4.82025
CVE-2025-3121 [MEDIUM] CVE-2025-3121: pytorch - A vulnerability classified as problematic has been found in PyTorch 2.6.0. Affec... A vulnerability classified as problematic has been found in PyTorch 2.6.0. Affected is the function torch.jit.jit_module_from_flatbuffer. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Scope: local bookworm: open bullseye: open forky: open sid: open trixie:
debian
CVE-2025-2998MEDIUMCVSS 4.82025
CVE-2025-2998 [MEDIUM] CVE-2025-2998: pytorch - A vulnerability was found in PyTorch 2.6.0. It has been declared as critical. Af... A vulnerability was found in PyTorch 2.6.0. It has been declared as critical. Affected by this vulnerability is the function torch.nn.utils.rnn.pad_packed_sequence. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Scope: local bookworm: open bullseye: open for
debian
CVE-2025-2999MEDIUMCVSS 4.82025
CVE-2025-2999 [MEDIUM] CVE-2025-2999: pytorch - A vulnerability was found in PyTorch 2.6.0. It has been rated as critical. Affec... A vulnerability was found in PyTorch 2.6.0. It has been rated as critical. Affected by this issue is the function torch.nn.utils.rnn.unpack_sequence. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: op
debian
CVE-2025-2953MEDIUMCVSS 4.82025
CVE-2025-2953 [MEDIUM] CVE-2025-2953: pytorch - A vulnerability, which was classified as problematic, has been found in PyTorch ... A vulnerability, which was classified as problematic, has been found in PyTorch 2.6.0+cu124. Affected by this issue is the function torch.mkldnn_max_pool2d. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the
debian
CVE-2025-4287MEDIUMCVSS 4.82025
CVE-2025-4287 [MEDIUM] CVE-2025-4287: pytorch - A vulnerability was found in PyTorch 2.6.0+cu124. It has been rated as problemat... A vulnerability was found in PyTorch 2.6.0+cu124. It has been rated as problematic. Affected by this issue is the function torch.cuda.nccl.reduce of the file torch/cuda/nccl.py. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The patch is identified as 5
debian
CVE-2025-3000MEDIUMCVSS 4.82025
CVE-2025-3000 [MEDIUM] CVE-2025-3000: pytorch - A vulnerability classified as critical has been found in PyTorch 2.6.0. This aff... A vulnerability classified as critical has been found in PyTorch 2.6.0. This affects the function torch.jit.script. The manipulation leads to memory corruption. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Scope: local bookworm: open bullseye: open forky: open sid: open trixie: open
debian