VYPR
Low severity3.3NVD Advisory· Published Apr 3, 2025· Updated Apr 15, 2026

CVE-2025-3145

CVE-2025-3145

Description

A vulnerability, which was classified as problematic, has been found in MindSpore 2.5.0. Affected by this issue is the function mindspore.numpy.fft.rfft2. The manipulation leads to memory corruption. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

MindSpore 2.5.0 has a local memory corruption vulnerability in `mindspore.numpy.fft.rfft2`, leading to a segmentation fault.

Vulnerability

Analysis

The vulnerability is a memory corruption issue in MindSpore version 2.5.0, specifically within the mindspore.numpy.fft.rfft2 function. The problem is classified as problematic with a low severity (CVSS 3.3). According to the advisory, the function's implementation can lead to memory corruption, which manifests as a segmentation fault during execution. The root cause appears to be improper memory handling, as reported in the MindSpore issue tracker [1].

Exploitation

Exploitation requires local access to the system, meaning an attacker must already have the ability to execute code on the target machine. No authentication is mentioned as a barrier, but the local nature implies the attacker needs some level of system access. The exploit has been publicly disclosed [1], which could lower the barrier for attackers who understand the specific input needed to trigger the fault.

Impact

Successful exploitation results in a segmentation fault, causing the affected MindSpore process to crash. This denial-of-service condition could disrupt machine learning workflows or applications relying on the library. While the vulnerability is classified as low severity due to local access requirements and limited impact (crash rather than code execution), it could be used in conjunction with other vulnerabilities to cause further disruption.

Mitigation

As of the publication date (2025-04-03), no patch has been mentioned in the available references. Users of MindSpore 2.5.0 are advised to avoid using the vulnerable rfft2 function with untrusted inputs. The issue has been reported and tracked, so users should monitor the MindSpore project for future security updates. No workarounds other than input validation or version rollback have been suggested.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.