Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-62609

Опубликовано: 21 нояб. 2025
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

MLX is an array framework for machine learning on Apple silicon. Prior to version 0.29.4, there is a segmentation fault in mlx::core::load_gguf() when loading malicious GGUF files. Untrusted pointer from external gguflib library is dereferenced without validation, causing application crash. This issue has been patched in version 0.29.4.

A segmentation fault flaw has been discovered in the python MLX library. The segmentation fault exists in mlx::core::load_gguf() and can be triggered when loading malicious GGUF files. An untrusted pointer from external the gguflib library is dereferenced without validation, causing an application crash.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ansible Automation Platform 2ansible-automation-platform-26/lightspeed-chatbot-rhel9Not affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=2416469mlx: MLX has Wild Pointer Dereference in load_gguf()

EPSS

Процентиль: 30%
0.00116
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
5 месяцев назад

MLX is an array framework for machine learning on Apple silicon. Prior to version 0.29.4, there is a segmentation fault in mlx::core::load_gguf() when loading malicious GGUF files. Untrusted pointer from external gguflib library is dereferenced without validation, causing application crash. This issue has been patched in version 0.29.4.

github
5 месяцев назад

MLX has Wild Pointer Dereference in load_gguf()

EPSS

Процентиль: 30%
0.00116
Низкий

5.3 Medium

CVSS3