Bug 2353764 (CVE-2024-9052) - CVE-2024-9052 vllm: Remote Code Execution by Pickle Deserialization in vllm-project/vllm
Summary: CVE-2024-9052 vllm: Remote Code Execution by Pickle Deserialization in vllm-p...
Keywords:
Status: NEW
Alias: CVE-2024-9052
Product: Security Response
Classification: Other
Component: vulnerability-draft
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-03-20 11:09 UTC by OSIDB Bzimport
Modified: 2025-04-30 09:54 UTC (History)
1 user (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-03-20 11:09:52 UTC
vllm-project vllm version 0.6.0 contains a vulnerability in the distributed training API. The function vllm.distributed.GroupCoordinator.recv_object() deserializes received object bytes using pickle.loads() without sanitization, leading to a remote code execution vulnerability.


Note You need to log in before you can comment on or make changes to this bug.