A vulnerability was found in PyTorch 2.6.0. It has been rated as critical. Affected by this issue is the function torch.nn.utils.rnn.unpack_sequence. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
{ "binaries": [ { "binary_name": "libtorch-dev", "binary_version": "2.6.0+dfsg-7" }, { "binary_name": "libtorch-test", "binary_version": "2.6.0+dfsg-7" }, { "binary_name": "libtorch2.6", "binary_version": "2.6.0+dfsg-7" }, { "binary_name": "python3-torch", "binary_version": "2.6.0+dfsg-7" } ] }
{ "binaries": [ { "binary_name": "libtorch-dev", "binary_version": "2.6.0+dfsg-5build1" }, { "binary_name": "libtorch-test", "binary_version": "2.6.0+dfsg-5build1" }, { "binary_name": "libtorch2.6", "binary_version": "2.6.0+dfsg-5build1" }, { "binary_name": "python3-torch", "binary_version": "2.6.0+dfsg-5build1" } ] }