Allocation of Resources Without Limits or Throttling Affecting py3.10-vllm-cuda-12.6 package, versions <0.8.5-r1


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CHAINGUARDLATEST-PY310VLLMCUDA126-10004393
  • published2 May 2025
  • disclosed30 Apr 2025

Introduced: 30 Apr 2025

NewCVE-2025-30202  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

Upgrade Chainguard py3.10-vllm-cuda-12.6 to version 0.8.5-r1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream py3.10-vllm-cuda-12.6 package and not the py3.10-vllm-cuda-12.6 package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Versions starting from 0.5.2 and prior to 0.8.5 are vulnerable to denial of service and data exposure via ZeroMQ on multi-node vLLM deployment. In a multi-node vLLM deployment, vLLM uses ZeroMQ for some multi-node communication purposes. The primary vLLM host opens an XPUB ZeroMQ socket and binds it to ALL interfaces. While the socket is always opened for a multi-node deployment, it is only used when doing tensor parallelism across multiple hosts. Any client with network access to this host can connect to this XPUB socket unless its port is blocked by a firewall. Once connected, these arbitrary clients will receive all of the same data broadcasted to all of the secondary vLLM hosts. This data is internal vLLM state information that is not useful to an attacker. By potentially connecting to this socket many times and not reading data published to them, an attacker can also cause a denial of service by slowing down or potentially blocking the publisher. This issue has been patched in version 0.8.5.