Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-11041

Опубликовано: 20 мар. 2025
Источник: redhat
CVSS3: 2.6
EPSS Низкий

Описание

vllm-project vllm version v0.6.2 contains a vulnerability in the MessageQueue.dequeue() API function. The function uses pickle.loads to parse received sockets directly, leading to a remote code execution vulnerability. An attacker can exploit this by sending a malicious payload to the MessageQueue, causing the victim's machine to execute arbitrary code.

A flaw was found in the vLLM MessageQueue. This vulnerability allows remote code execution via the MessageQueue.dequeue() function, which improperly uses pickle.loads to parse received sockets, enabling an attacker to execute arbitrary code by sending a malicious payload.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux AI (RHEL AI)rhelai1/bootc-amd-rhel9Fix deferred
Red Hat Enterprise Linux AI (RHEL AI)rhelai1/bootc-aws-nvidia-rhel9Fix deferred
Red Hat Enterprise Linux AI (RHEL AI)rhelai1/bootc-azure-amd-rhel9Not affected
Red Hat Enterprise Linux AI (RHEL AI)rhelai1/bootc-azure-nvidia-rhel9Fix deferred
Red Hat Enterprise Linux AI (RHEL AI)rhelai1/bootc-gcp-nvidia-rhel9Fix deferred
Red Hat Enterprise Linux AI (RHEL AI)rhelai1/bootc-ibm-nvidia-rhel9Fix deferred
Red Hat Enterprise Linux AI (RHEL AI)rhelai1/bootc-intel-rhel9Fix deferred
Red Hat Enterprise Linux AI (RHEL AI)rhelai1/bootc-nvidia-rhel9Fix deferred
Red Hat Enterprise Linux AI (RHEL AI)rhelai1/instructlab-amd-rhel9Fix deferred
Red Hat Enterprise Linux AI (RHEL AI)rhelai1/instructlab-intel-rhel9Affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=2353718vllm: Remote Code Execution in vllm-project/vllm

EPSS

Процентиль: 79%
0.01251
Низкий

2.6 Low

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
11 месяцев назад

vllm-project vllm version v0.6.2 contains a vulnerability in the MessageQueue.dequeue() API function. The function uses pickle.loads to parse received sockets directly, leading to a remote code execution vulnerability. An attacker can exploit this by sending a malicious payload to the MessageQueue, causing the victim's machine to execute arbitrary code.

CVSS3: 9.8
debian
11 месяцев назад

vllm-project vllm version v0.6.2 contains a vulnerability in the Messa ...

CVSS3: 9.8
github
11 месяцев назад

vLLM Deserialization of Untrusted Data vulnerability

EPSS

Процентиль: 79%
0.01251
Низкий

2.6 Low

CVSS3

Уязвимость CVE-2024-11041