MooreThreads torch_musa through all versions contains an unsafe deserialization vulnerability in torch_musa.utils.compare_tool. The compare_for_single_op() and nan_inf_track_for_single_op() functions use pickle.load() on user-controlled file paths without validation, allowing arbitrary code execution. An attacker can craft a malicious pickle file that executes arbitrary Python code when loaded, enabling remote code execution with the privileges of the victim process.
History

Mon, 15 Dec 2025 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-502
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 15 Dec 2025 19:00:00 +0000

Type Values Removed Values Added
Description MooreThreads torch_musa through all versions contains an unsafe deserialization vulnerability in torch_musa.utils.compare_tool. The compare_for_single_op() and nan_inf_track_for_single_op() functions use pickle.load() on user-controlled file paths without validation, allowing arbitrary code execution. An attacker can craft a malicious pickle file that executes arbitrary Python code when loaded, enabling remote code execution with the privileges of the victim process.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-12-15T00:00:00.000Z

Updated: 2025-12-15T18:59:48.940Z

Reserved: 2025-11-18T00:00:00.000Z

Link: CVE-2025-65213

cve-icon Vulnrichment

Updated: 2025-12-15T18:58:43.885Z

cve-icon NVD

Status : Received

Published: 2025-12-15T19:16:05.207

Modified: 2025-12-15T19:16:05.207

Link: CVE-2025-65213

cve-icon Redhat

No data.