A vulnerability classified as critical has been found in thu-pacman chitu 0.1.0. This affects the function torch.load of the file chitu/chitu/backend.py. The manipulation of the argument ckpt_path/quant_ckpt_dir leads to deserialization. An attack has to be approached locally.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://vuldb.com/?id.303111 | vdb entry technical description |
https://vuldb.com/?ctiid.303111 | signature permissions required |
https://vuldb.com/?submit.542529 | third party advisory |
https://github.com/thu-pacman/chitu/issues/32 | issue tracking |