Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-9644 | A vulnerability classified as critical has been found in thu-pacman chitu 0.1.0. This affects the function torch.load of the file chitu/chitu/backend.py. The manipulation of the argument ckpt_path/quant_ckpt_dir leads to deserialization. An attack has to be approached locally. |
Mon, 07 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 03 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability classified as critical has been found in thu-pacman chitu 0.1.0. This affects the function torch.load of the file chitu/chitu/backend.py. The manipulation of the argument ckpt_path/quant_ckpt_dir leads to deserialization. An attack has to be approached locally. | |
| Title | thu-pacman chitu backend.py torch.load deserialization | |
| Weaknesses | CWE-20 CWE-502 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-04-21T11:28:03.900Z
Reserved: 2025-04-03T07:17:43.841Z
Link: CVE-2025-3165
Updated: 2025-04-07T18:26:19.144Z
Status : Deferred
Published: 2025-04-03T16:15:37.530
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-3165
No data.
OpenCVE Enrichment
No data.
EUVD