A vulnerability was found in PyTorch 2.6.0. It has been rated as critical. Affected by this issue is the function torch.nn.utils.rnn.unpack_sequence. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
{
"binaries": [
{
"binary_name": "libtorch-dev",
"binary_version": "2.6.0+dfsg-7"
},
{
"binary_name": "libtorch-test",
"binary_version": "2.6.0+dfsg-7"
},
{
"binary_name": "libtorch2.6",
"binary_version": "2.6.0+dfsg-7"
},
{
"binary_name": "python3-torch",
"binary_version": "2.6.0+dfsg-7"
}
]
}
{
"binaries": [
{
"binary_name": "libtorch-dev",
"binary_version": "2.6.0+dfsg-5build1"
},
{
"binary_name": "libtorch-test",
"binary_version": "2.6.0+dfsg-5build1"
},
{
"binary_name": "libtorch2.6",
"binary_version": "2.6.0+dfsg-5build1"
},
{
"binary_name": "python3-torch",
"binary_version": "2.6.0+dfsg-5build1"
}
]
}