Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-62608

Опубликовано: 21 нояб. 2025
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

MLX is an array framework for machine learning on Apple silicon. Prior to version 0.29.4, there is a heap buffer overflow in mlx::core::load() when parsing malicious NumPy .npy files. Attacker-controlled file causes 13-byte out-of-bounds read, leading to crash or information disclosure. This issue has been patched in version 0.29.4.

A heap based buffer overflow flaw has been discovered in the python MLX library. The heap buffer overflow exists in mlx::core::load() and can be triggered when parsing malicious NumPy .npy files. An attacker-controlled file can cause a 13-byte out-of-bounds read, leading to crash or information disclosure.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ansible Automation Platform 2ansible-automation-platform-26/lightspeed-chatbot-rhel9Not affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=2416470mlx: MLX has heap-buffer-overflow in load()

EPSS

Процентиль: 27%
0.00095
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 9.1
nvd
5 месяцев назад

MLX is an array framework for machine learning on Apple silicon. Prior to version 0.29.4, there is a heap buffer overflow in mlx::core::load() when parsing malicious NumPy .npy files. Attacker-controlled file causes 13-byte out-of-bounds read, leading to crash or information disclosure. This issue has been patched in version 0.29.4.

github
5 месяцев назад

MLX has heap-buffer-overflow in load()

EPSS

Процентиль: 27%
0.00095
Низкий

6.5 Medium

CVSS3