MooreThreads torch_musa through all versions contains an unsafe deserialization vulnerability in torch_musa.utils.compare_tool. The compare_for_single_op() and nan_inf_track_for_single_op() functions use pickle.load() on user-controlled file paths without validation, allowing arbitrary code execution. An attacker can craft a malicious pickle file that executes arbitrary Python code when loaded, enabling remote code execution with the privileges of the victim process.
Metrics
Affected Vendors & Products
References
History
Wed, 07 Jan 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mthreads
Mthreads torch Musa |
|
| CPEs | cpe:2.3:a:mthreads:torch_musa:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Mthreads
Mthreads torch Musa |
Mon, 15 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-502 | |
| Metrics |
cvssV3_1
|
Mon, 15 Dec 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MooreThreads torch_musa through all versions contains an unsafe deserialization vulnerability in torch_musa.utils.compare_tool. The compare_for_single_op() and nan_inf_track_for_single_op() functions use pickle.load() on user-controlled file paths without validation, allowing arbitrary code execution. An attacker can craft a malicious pickle file that executes arbitrary Python code when loaded, enabling remote code execution with the privileges of the victim process. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-12-15T00:00:00.000Z
Updated: 2025-12-15T18:59:48.940Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65213
Updated: 2025-12-15T18:58:43.885Z
Status : Analyzed
Published: 2025-12-15T19:16:05.207
Modified: 2026-01-07T20:51:19.160
Link: CVE-2025-65213
No data.