Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-j842-xgm4-wf88 | MLX has Wild Pointer Dereference in load_gguf() |
Tue, 02 Dec 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ml-explore:mlx:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ml-explore
Ml-explore mlx |
|
| Vendors & Products |
Ml-explore
Ml-explore mlx |
Sat, 22 Nov 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 21 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MLX is an array framework for machine learning on Apple silicon. Prior to version 0.29.4, there is a segmentation fault in mlx::core::load_gguf() when loading malicious GGUF files. Untrusted pointer from external gguflib library is dereferenced without validation, causing application crash. This issue has been patched in version 0.29.4. | |
| Title | MLX has Wild Pointer Dereference in load_gguf() | |
| Weaknesses | CWE-476 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-21T19:09:33.874Z
Reserved: 2025-10-16T19:24:37.268Z
Link: CVE-2025-62609
Updated: 2025-11-21T19:09:30.033Z
Status : Analyzed
Published: 2025-11-21T19:16:02.467
Modified: 2025-12-02T16:30:45.820
Link: CVE-2025-62609
OpenCVE Enrichment
Updated: 2025-11-24T09:08:00Z
Github GHSA