Vulnerabilites related to Meta Platforms, Inc - Llama Stack
CVE-2024-50050 (GCVE-0-2024-50050)
Vulnerability from cvelistv5
Published
2024-10-23 13:35
Modified
2024-10-24 18:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Deserialization of Untrusted Data (CWE-502)
Summary
Llama Stack prior to revision 7a8aa775e5a267cf8660d83140011a0b7f91e005 used pickle as a serialization format for socket communication, potentially allowing for remote code execution. Socket communication has been changed to use JSON instead.
References
▼ | URL | Tags |
---|---|---|
https://www.facebook.com/security/advisories/cve-2024-50050 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Meta Platforms, Inc | Llama Stack |
Version: 0 ≤ |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:meta_platforms_inc:llama_stack:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "llama_stack", "vendor": "meta_platforms_inc", "versions": [ { "lessThan": "7a8aa775e5a267cf8660d83140011a0b7f91e005", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-50050", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-24T18:04:11.237412Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-24T18:26:22.699Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Llama Stack", "vendor": "Meta Platforms, Inc", "versions": [ { "lessThan": "7a8aa775e5a267cf8660d83140011a0b7f91e005", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "dateAssigned": "2024-10-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Llama Stack prior to revision 7a8aa775e5a267cf8660d83140011a0b7f91e005 used pickle as a serialization format for socket communication, potentially allowing for remote code execution. Socket communication has been changed to use JSON instead." } ], "problemTypes": [ { "descriptions": [ { "description": "Deserialization of Untrusted Data (CWE-502)", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-23T13:35:17.320Z", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.facebook.com/security/advisories/cve-2024-50050" } ] } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2024-50050", "datePublished": "2024-10-23T13:35:17.320Z", "dateReserved": "2024-10-21T15:18:52.624Z", "dateUpdated": "2024-10-24T18:26:22.699Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-55178 (GCVE-0-2025-55178)
Vulnerability from cvelistv5
Published
2025-09-24 18:31
Modified
2025-09-24 18:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Llama Stack prior to version v0.2.20 accepted unverified parameters in the resolve_ast_by_type function which could potentially allow for remote code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.facebook.com/security/advisories/cve-2025-55178 | x_refsource_CONFIRM | |
https://github.com/llamastack/llama-stack/pull/3281 | x_refsource_CONFIRM | |
https://github.com/llamastack/llama-stack/releases/tag/v0.2.20 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Meta Platforms, Inc | Llama Stack |
Version: 0.0.0 ≤ |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-55178", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-09-24T18:49:33.013687Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-24T18:50:01.680Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Llama Stack", "vendor": "Meta Platforms, Inc", "versions": [ { "lessThan": "0.2.20", "status": "affected", "version": "0.0.0", "versionType": "semver" } ] } ], "dateAssigned": "2025-09-15T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Llama Stack prior to version v0.2.20 accepted unverified parameters in the resolve_ast_by_type function which could potentially allow for remote code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-24T18:31:28.309Z", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "Meta" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.facebook.com/security/advisories/cve-2025-55178" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/llamastack/llama-stack/pull/3281" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/llamastack/llama-stack/releases/tag/v0.2.20" } ] } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "Meta", "cveId": "CVE-2025-55178", "datePublished": "2025-09-24T18:31:28.309Z", "dateReserved": "2025-08-08T18:21:47.119Z", "dateUpdated": "2025-09-24T18:50:01.680Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }