← Volver a CVEs
CVE-2026-21869
HIGH8.8
Descripcion
llama.cpp is an inference of several LLM models in C/C++. In commits 55d4206c8 and prior, the n_discard parameter is parsed directly from JSON input in the llama.cpp server's completion endpoints without validation to ensure it's non-negative. When a negative value is supplied and the context fills up, llama_memory_seq_rm/add receives a reversed range and negative offset, causing out-of-bounds memory writes in the token evaluation loop. This deterministic memory corruption can crash the process or enable remote code execution (RCE). There is no fix at the time of publication.
Detalles CVE
Puntuacion CVSS v3.18.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioREQUIRED
Publicado1/8/2026
Ultima modificacion2/2/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
ggml:llama.cpp
Debilidades (CWE)
CWE-787
Referencias
https://github.com/ggml-org/llama.cpp/security/advisories/GHSA-8947-pfff-2f3c(security-advisories@github.com)
https://github.com/ggml-org/llama.cpp/security/advisories/GHSA-8947-pfff-2f3c(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.