MooreThreads torch_musa through all versions contains an unsafe deserialization vulnerability in torch_musa.utils.compare_tool. The compare_for_single_op() and nan_inf_track_for_single_op() functions use pickle.load() on user-controlled file paths without validation, allowing arbitrary code execution. An attacker can craft a malicious pickle file that executes arbitrary Python code when loaded, enabling remote code execution with the privileges of the victim process.
Metrics
Affected Vendors & Products
References
History
Mon, 15 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-502 | |
| Metrics |
cvssV3_1
|
Mon, 15 Dec 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MooreThreads torch_musa through all versions contains an unsafe deserialization vulnerability in torch_musa.utils.compare_tool. The compare_for_single_op() and nan_inf_track_for_single_op() functions use pickle.load() on user-controlled file paths without validation, allowing arbitrary code execution. An attacker can craft a malicious pickle file that executes arbitrary Python code when loaded, enabling remote code execution with the privileges of the victim process. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-12-15T00:00:00.000Z
Updated: 2025-12-15T18:59:48.940Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65213
Updated: 2025-12-15T18:58:43.885Z
Status : Received
Published: 2025-12-15T19:16:05.207
Modified: 2025-12-15T19:16:05.207
Link: CVE-2025-65213
No data.