Home » Database

AVID-2026-R1520

Description

llama.cpp allows Arbitrary Address Read in rpc_server::get_tensor (CVE-2024-42478)

Details

llama.cpp provides LLM inference in C/C++. The unsafe data pointer member in the rpc_tensor structure can cause arbitrary address reading. This vulnerability is fixed in b3561.

Reason for inclusion in AVID: The CVE targets llama.cpp, a general-purpose AI inference library used in ML pipelines. It describes an out-of-bounds read vulnerability in a component (rpc_tensor) of llama.cpp that can be exploited remotely, which is a software vulnerability affecting AI software stacks used to build/serve AI models. The issue is in a software dependency/component relevant to AI systems, and there are references and a fix commit, providing sufficient evidence.

References

Affected or Relevant Artifacts

  • Developer: Meta
  • Deployer: ggerganov
  • Artifact Details:
TypeName
Systemllama.cpp

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Base Score5.3
Base Severity🟠 Medium
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🟢 Low
Integrity ImpactNONE
Availability ImpactNONE

CWE

IDDescription
CWE-125CWE-125: Out-of-bounds Read

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2024-08-12
  • Version: 0.3.3
  • AVID Entry