Your message dated Fri, 20 Jun 2025 20:34:44 +0000 with message-id <E1uSiRg-00AHgZ-VJ@fasolo.debian.org> and subject line Bug#1108113: fixed in llama.cpp 5713+dfsg-1 has caused the Debian Bug report #1108113, regarding llama.cpp: CVE-2025-49847 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1108113: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108113 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: llama.cpp: CVE-2025-49847
- From: Salvatore Bonaccorso <carnil@debian.org>
- Date: Fri, 20 Jun 2025 21:23:09 +0200
- Message-id: <[🔎] 175044738936.2903645.16836680366806734939.reportbug@eldamar.lan>
Source: llama.cpp Version: 5318+dfsg-1 Severity: grave Tags: security upstream X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org> Hi, The following vulnerability was published for llama.cpp. CVE-2025-49847[0]: | llama.cpp is an inference of several LLM models in C/C++. Prior to | version b5662, an attacker‐supplied GGUF model vocabulary can | trigger a buffer overflow in llama.cpp’s vocabulary‐loading code. | Specifically, the helper _try_copy in llama.cpp/src/vocab.cpp: | llama_vocab::impl::token_to_piece() casts a very large size_t token | length into an int32_t, causing the length check (if (length < | (int32_t)size)) to be bypassed. As a result, memcpy is still called | with that oversized size, letting a malicious model overwrite memory | beyond the intended buffer. This can lead to arbitrary memory | corruption and potential code execution. This issue has been patched | in version b5662. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-49847 https://www.cve.org/CVERecord?id=CVE-2025-49847 [1] https://github.com/ggml-org/llama.cpp/security/advisories/GHSA-8wwf-w4qm-gpqr [2] https://github.com/ggml-org/llama.cpp/commit/3cfbbdb44e08fd19429fed6cc85b982a91f0efd5 Regards, Salvatore
--- End Message ---
--- Begin Message ---
- To: 1108113-close@bugs.debian.org
- Subject: Bug#1108113: fixed in llama.cpp 5713+dfsg-1
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Fri, 20 Jun 2025 20:34:44 +0000
- Message-id: <E1uSiRg-00AHgZ-VJ@fasolo.debian.org>
- Reply-to: Christian Kastner <ckk@debian.org>
Source: llama.cpp Source-Version: 5713+dfsg-1 Done: Christian Kastner <ckk@debian.org> We believe that the bug you reported is fixed in the latest version of llama.cpp, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1108113@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Christian Kastner <ckk@debian.org> (supplier of updated llama.cpp package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Fri, 20 Jun 2025 21:00:33 +0200 Source: llama.cpp Architecture: source Version: 5713+dfsg-1 Distribution: unstable Urgency: medium Maintainer: Debian Deep Learning Team <debian-ai@lists.debian.org> Changed-By: Christian Kastner <ckk@debian.org> Closes: 1108113 Changes: llama.cpp (5713+dfsg-1) unstable; urgency=medium . * New upstream release (Closes: #1108113) - Includes a fix for CVE-2025-49847 * Refresh patches * Update d/copyright * Document ggml/llama.cpp/whisper.cpp update procedure * Install the new mtmd headers Checksums-Sha1: 94302d79f1ea62456e84634d8871a02a4420fc6d 2010 llama.cpp_5713+dfsg-1.dsc 30647c168358fde6e6014a10565b643157fee655 4907684 llama.cpp_5713+dfsg.orig.tar.xz e9831512fc1384d4705f8436c5a0efd385837b88 8956 llama.cpp_5713+dfsg-1.debian.tar.xz e1dabf3e0a2fcdd309edea654d71eddd353c13ca 6827 llama.cpp_5713+dfsg-1_source.buildinfo Checksums-Sha256: 9785b962bf06465d2d98d116d9950ded1582cd616be7410f86276ff0ef4e2f66 2010 llama.cpp_5713+dfsg-1.dsc c89f31b934d364960bf38a1e7097ab4069c13969aad9a8ea26a6034ecd88708c 4907684 llama.cpp_5713+dfsg.orig.tar.xz fa6cd498c46f3797a10e5c12ab4aa1649c6cd8d04212e2ed841a3da296614940 8956 llama.cpp_5713+dfsg-1.debian.tar.xz 9135537b0eebe48228d6f5f22cfb8b63c604892877c77f9cd78716edbb786b68 6827 llama.cpp_5713+dfsg-1_source.buildinfo Files: b0f8f855b4557631b7b7172e3fabca32 2010 science optional llama.cpp_5713+dfsg-1.dsc 0bab352dde58ebd608330f11873e6f87 4907684 science optional llama.cpp_5713+dfsg.orig.tar.xz 23d7674b12bb4209d89ba35852b41ca7 8956 science optional llama.cpp_5713+dfsg-1.debian.tar.xz 83b459a17028e3cdaecf4f03f8589fff 6827 science optional llama.cpp_5713+dfsg-1_source.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEQZ9+mkfDq5UZ8bCjOZU6N95Os2sFAmhVvDIACgkQOZU6N95O s2vIwQ//XKGmvf5qejT0JBsR/jdXWh4DPsqrErtNpqGNiF6H2avL8jsE9TaCV0Gz r7lM6arNjytss7VAXVQDUAIhGXtjb51nLU22+CwTGd0nfUvLhwFmzX1d1mqmVK1f 8d6EWn5pPlTNMjTX1bdvk7UewhJdUfETJE4vm+cJClaOSc24k0s3wOS1ak3nS4fY m8VFKisQw2wIqc2InpFTalKnsrGzW87KJtVyYSouQsMqz2ui82lKbLiZMobfDx0c zENTRpulArkIIjh509SpJAao+hJZ+osJKesEE9x1ve2FgpTNTGuqiUEyLtYR+IKZ Q6MolYsb0LC7jloOlZB4cN/nEl2Q1CGiwoSUxZ1NHGDEvNYBCt0xGbHaGYZa/jF7 7g32C/mXWwJDTdTT6WSB/BBNr+EyFl4Y1ZH23/pcR+DziVVNzK1xU+tE+ljcRp+x ibxhT6ElN6mHU2ENx37AJg3SiJVix9V31nNTGb5yxK9vukBmpswO3xNs/x4Zbfcx fJ/xJi/PCaFjg2XJWP8h1qaBvix7mBxJJwvYJOcCicO8EKTwYTRE53l9tWJUbMzZ nP2o7HMq5yaZNn95WNBpzHiRSZfxgOfN7qmm7Dps7kDAUor9xTKUoS9EFsKBnfcw LDKM2PobpfqDOt9R9VwXDN9mWm6tZuiQvMAKGYDIeyEVQkEOWFc= =jcti -----END PGP SIGNATURE-----Attachment: pgpts8qIuYamU.pgp
Description: PGP signature
--- End Message ---