CVE-2024-12704: CWE-835 Loop with Unreachable Exit Condition in run-llama run-llama/llama_index
A vulnerability in the LangChainLLM class of the run-llama/llama_index repository, version v0.12.5, allows for a Denial of Service (DoS) attack. The stream_complete method executes the llm using a thread and retrieves the result via the get_response_gen method of the StreamingGeneratorCallbackHandler class. If the thread terminates abnormally before the _llm.predict is executed, there is no exception handling for this case, leading to an infinite loop in the get_response_gen function. This can be triggered by providing an input of an incorrect type, causing the thread to terminate and the process to continue running indefinitely.
CVE-2024-12704: CWE-835 Loop with Unreachable Exit Condition in run-llama run-llama/llama_index
Description
A vulnerability in the LangChainLLM class of the run-llama/llama_index repository, version v0.12.5, allows for a Denial of Service (DoS) attack. The stream_complete method executes the llm using a thread and retrieves the result via the get_response_gen method of the StreamingGeneratorCallbackHandler class. If the thread terminates abnormally before the _llm.predict is executed, there is no exception handling for this case, leading to an infinite loop in the get_response_gen function. This can be triggered by providing an input of an incorrect type, causing the thread to terminate and the process to continue running indefinitely.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-12-17T10:58:19.646Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b24178f764e1f470af3
Added to database: 10/15/2025, 1:01:24 PM
Last updated: 10/15/2025, 1:02:13 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-1796: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in langgenius langgenius/dify
HighCVE-2025-1451: CWE-770 Allocation of Resources Without Limits or Throttling in parisneo parisneo/lollms-webui
HighCVE-2025-1040: CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine in significant-gravitas significant-gravitas/autogpt
HighCVE-2025-0628: CWE-266 Incorrect Privilege Assignment in berriai berriai/litellm
HighCVE-2025-0508: CWE-328 Reversible One-Way Hash in aws aws/sagemaker-python-sdk
MediumActions
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.