Impact
A bounds‑validation flaw in llama.cpp’s RPC backend allows an unauthenticated attacker to send a crafted GRAPH_COMPUTE message that causes the deserialize_tensor() routine to read or write arbitrary process memory. The vulnerability is a classic out‑of‑bounds memory access (CWE‑119) and is combined with leaked pointers from ALLOC_BUFFER/BUFFER_GET_BASE to bypass address space layout randomization, enabling full remote code execution.
Affected Systems
The issue affects the llama.cpp inference library from ggml‑org. All releases prior to commit b8492 are vulnerable; the patch is included in b8492 and later versions.
Risk and Exploitability
The CVSS score of 9.8 indicates critical severity, and the server is reachable via plain TCP on its RPC port without any authentication. EPSS data is not available, but the known exploit paths and high severity suggest a high likelihood of exploitation in exposed environments. The vulnerability is not yet listed in the CISA KEV catalog.
OpenCVE Enrichment