CVE-2024-9052: vLLM deserialization vulnerability in vllm.distributed.GroupCoordinator.recv_object
(updated )
vllm-project vllm version 0.6.0 contains a vulnerability in the distributed training API. The function vllm.distributed.GroupCoordinator.recv_object() deserializes received object bytes using pickle.loads() without sanitization, leading to a remote code execution vulnerability.
References
- github.com/advisories/GHSA-pgr7-mhp5-fgjp
- github.com/github/advisory-database/pull/5444
- github.com/vllm-project/vllm
- github.com/vllm-project/vllm/blob/32e7db25365415841ebc7c4215851743fbb1bad1/vllm/distributed/parallel_state.py
- github.com/vllm-project/vllm/blob/v0.8.1/vllm/distributed/parallel_state.py
- huntr.com/bounties/ea75728f-4efe-4a3d-9f53-33f2c908e9f8
- nvd.nist.gov/vuln/detail/CVE-2024-9052
Code Behaviors & Features
Detect and mitigate CVE-2024-9052 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →