Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-w6vg-jg77-2qg6 | MLX has heap-buffer-overflow in load() |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ml-explore
Ml-explore mlx |
|
| Vendors & Products |
Ml-explore
Ml-explore mlx |
Sat, 22 Nov 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 21 Nov 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 21 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MLX is an array framework for machine learning on Apple silicon. Prior to version 0.29.4, there is a heap buffer overflow in mlx::core::load() when parsing malicious NumPy .npy files. Attacker-controlled file causes 13-byte out-of-bounds read, leading to crash or information disclosure. This issue has been patched in version 0.29.4. | |
| Title | MLX has heap-buffer-overflow in load() | |
| Weaknesses | CWE-122 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-21T19:10:00.724Z
Reserved: 2025-10-16T19:24:37.268Z
Link: CVE-2025-62608
Updated: 2025-11-21T19:09:57.563Z
Status : Awaiting Analysis
Published: 2025-11-21T19:16:02.267
Modified: 2025-11-25T22:16:42.557
Link: CVE-2025-62608
OpenCVE Enrichment
Updated: 2025-11-24T09:07:59Z
Github GHSA