Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-w6vg-jg77-2qg6 | MLX has heap-buffer-overflow in load() |
Tue, 02 Dec 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ml-explore:mlx:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ml-explore
Ml-explore mlx |
|
| Vendors & Products |
Ml-explore
Ml-explore mlx |
Sat, 22 Nov 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 21 Nov 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 21 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MLX is an array framework for machine learning on Apple silicon. Prior to version 0.29.4, there is a heap buffer overflow in mlx::core::load() when parsing malicious NumPy .npy files. Attacker-controlled file causes 13-byte out-of-bounds read, leading to crash or information disclosure. This issue has been patched in version 0.29.4. | |
| Title | MLX has heap-buffer-overflow in load() | |
| Weaknesses | CWE-122 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-21T19:10:00.724Z
Reserved: 2025-10-16T19:24:37.268Z
Link: CVE-2025-62608
Updated: 2025-11-21T19:09:57.563Z
Status : Analyzed
Published: 2025-11-21T19:16:02.267
Modified: 2025-12-02T16:34:51.837
Link: CVE-2025-62608
OpenCVE Enrichment
Updated: 2025-11-24T09:07:59Z
Github GHSA