UNCLASSIFIED - NO CUI

chore(findings): opensource/triton-inference-server/server

Summary

opensource/triton-inference-server/server has 116 new findings discovered during continuous monitoring.

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/triton-inference-server/server&tag=24.12.01&branch=master

EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.

KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.

id source severity package impact workaround epss_score kev
CVE-2018-6952 Twistlock CVE Low patch-2.7.6-7build3 0.11805 false
CVE-2018-6952 Anchore CVE Low patch-2.7.6-7build3 0.11805 false
CVE-2025-1352 Anchore CVE Low libelf1t64-0.190-1.1build4.1 0.00398 false
CVE-2025-1352 Twistlock CVE Low elfutils-0.190-1.1build4.1 0.00398 false
CVE-2025-1180 Twistlock CVE Medium binutils-2.42-4ubuntu2.8 0.00279 false
CVE-2025-1180 Anchore CVE Medium libctf0-2.42-4ubuntu2.8 0.00279 false
CVE-2025-1180 Anchore CVE Medium libctf-nobfd0-2.42-4ubuntu2.8 0.00279 false
CVE-2025-1180 Anchore CVE Medium libsframe1-2.42-4ubuntu2.8 0.00279 false
CVE-2025-1180 Anchore CVE Medium binutils-common-2.42-4ubuntu2.8 0.00279 false
CVE-2025-1180 Anchore CVE Medium libbinutils-2.42-4ubuntu2.8 0.00279 false
CVE-2025-1180 Anchore CVE Medium binutils-2.42-4ubuntu2.8 0.00279 false
CVE-2025-1180 Anchore CVE Medium libgprofng0-2.42-4ubuntu2.8 0.00279 false
CVE-2025-1180 Anchore CVE Medium binutils-x86-64-linux-gnu-2.42-4ubuntu2.8 0.00279 false
CVE-2021-45261 Twistlock CVE Low patch-2.7.6-7build3 0.00266 false
CVE-2021-45261 Anchore CVE Low patch-2.7.6-7build3 0.00266 false
CVE-2025-14087 Anchore CVE Medium libglib2.0-data-2.80.0-6ubuntu3.2 0.00259 false
CVE-2025-14087 Anchore CVE Medium libglib2.0-bin-2.80.0-6ubuntu3.5 0.00259 false
CVE-2025-14087 Anchore CVE Medium libglib2.0-0t64-2.80.0-6ubuntu3.5 0.00259 false
CVE-2017-13716 Twistlock CVE Low binutils-2.42-4ubuntu2.8 0.00237 false
CVE-2017-13716 Anchore CVE Low libctf-nobfd0-2.42-4ubuntu2.8 0.00237 false
CVE-2017-13716 Anchore CVE Low libsframe1-2.42-4ubuntu2.8 0.00237 false
CVE-2017-13716 Anchore CVE Low binutils-2.42-4ubuntu2.8 0.00237 false
CVE-2017-13716 Anchore CVE Low libgprofng0-2.42-4ubuntu2.8 0.00237 false
CVE-2017-13716 Anchore CVE Low binutils-common-2.42-4ubuntu2.8 0.00237 false
CVE-2017-13716 Anchore CVE Low libbinutils-2.42-4ubuntu2.8 0.00237 false
CVE-2017-13716 Anchore CVE Low libctf0-2.42-4ubuntu2.8 0.00237 false
CVE-2017-13716 Anchore CVE Low binutils-x86-64-linux-gnu-2.42-4ubuntu2.8 0.00237 false
CVE-2025-1152 Twistlock CVE Low binutils-2.42-4ubuntu2.8 0.00181 false
CVE-2025-1152 Anchore CVE Low binutils-x86-64-linux-gnu-2.42-4ubuntu2.8 0.00181 false
CVE-2025-1152 Anchore CVE Low binutils-common-2.42-4ubuntu2.8 0.00181 false
CVE-2025-1152 Anchore CVE Low libctf0-2.42-4ubuntu2.8 0.00181 false
CVE-2025-1152 Anchore CVE Low libbinutils-2.42-4ubuntu2.8 0.00181 false
CVE-2025-1152 Anchore CVE Low libgprofng0-2.42-4ubuntu2.8 0.00181 false
CVE-2025-1152 Anchore CVE Low libsframe1-2.42-4ubuntu2.8 0.00181 false
CVE-2025-1152 Anchore CVE Low binutils-2.42-4ubuntu2.8 0.00181 false
CVE-2025-1152 Anchore CVE Low libctf-nobfd0-2.42-4ubuntu2.8 0.00181 false
CVE-2025-1150 Anchore CVE Low libsframe1-2.42-4ubuntu2.8 0.00181 false
CVE-2025-1150 Anchore CVE Low libctf-nobfd0-2.42-4ubuntu2.8 0.00181 false
CVE-2025-1150 Anchore CVE Low libctf0-2.42-4ubuntu2.8 0.00181 false
CVE-2025-1150 Anchore CVE Low libgprofng0-2.42-4ubuntu2.8 0.00181 false
CVE-2025-1150 Anchore CVE Low binutils-2.42-4ubuntu2.8 0.00181 false
CVE-2025-1150 Anchore CVE Low binutils-x86-64-linux-gnu-2.42-4ubuntu2.8 0.00181 false
CVE-2025-1150 Anchore CVE Low binutils-common-2.42-4ubuntu2.8 0.00181 false
CVE-2025-1150 Anchore CVE Low libbinutils-2.42-4ubuntu2.8 0.00181 false
CVE-2025-1151 Anchore CVE Low binutils-x86-64-linux-gnu-2.42-4ubuntu2.8 0.00167 false
CVE-2025-1151 Anchore CVE Low libctf0-2.42-4ubuntu2.8 0.00167 false
CVE-2025-1151 Anchore CVE Low libsframe1-2.42-4ubuntu2.8 0.00167 false
CVE-2025-1151 Anchore CVE Low libbinutils-2.42-4ubuntu2.8 0.00167 false
CVE-2025-1151 Anchore CVE Low libgprofng0-2.42-4ubuntu2.8 0.00167 false
CVE-2025-1151 Anchore CVE Low libctf-nobfd0-2.42-4ubuntu2.8 0.00167 false
CVE-2025-1151 Anchore CVE Low binutils-2.42-4ubuntu2.8 0.00167 false
CVE-2025-1151 Anchore CVE Low binutils-common-2.42-4ubuntu2.8 0.00167 false
CVE-2025-0167 Anchore CVE Low libcurl4-openssl-dev-8.5.0-2ubuntu10.6 0.00160 false
CVE-2025-0167 Anchore CVE Low libcurl4t64-8.5.0-2ubuntu10.6 0.00160 false
CVE-2025-0167 Twistlock CVE Low curl-8.5.0-2ubuntu10.6 0.00160 false
CVE-2025-59375 Anchore CVE Medium libexpat1-2.6.1-2ubuntu0.3 0.00131 false
CVE-2025-4373 Anchore CVE Medium libglib2.0-data-2.80.0-6ubuntu3.2 0.00122 false
CVE-2025-4373 Twistlock CVE Medium glib2.0-2.80.0-6ubuntu3.2 0.00122 false
CVE-2019-20633 Anchore CVE Low patch-2.7.6-7build3 0.00115 false
CVE-2025-1372 Anchore CVE Medium libelf1t64-0.190-1.1build4.1 0.00104 false
CVE-2025-1372 Twistlock CVE Medium elfutils-0.190-1.1build4.1 0.00104 false
CVE-2025-7039 Anchore CVE Low libglib2.0-data-2.80.0-6ubuntu3.2 0.00093 false
CVE-2025-7039 Anchore CVE Low libglib2.0-0t64-2.80.0-6ubuntu3.5 0.00093 false
CVE-2025-7039 Anchore CVE Low libglib2.0-bin-2.80.0-6ubuntu3.5 0.00093 false
CVE-2025-8277 Anchore CVE Low libssh-4-0.10.6-2ubuntu0.2 0.00072 false
CVE-2025-1377 Anchore CVE Medium libelf1t64-0.190-1.1build4.1 0.00070 false
CVE-2025-1377 Twistlock CVE Medium elfutils-0.190-1.1build4.1 0.00070 false
CVE-2025-1376 Anchore CVE Low libelf1t64-0.190-1.1build4.1 0.00070 false
CVE-2025-1376 Twistlock CVE Low elfutils-0.190-1.1build4.1 0.00070 false
CVE-2025-10148 Anchore CVE Low libcurl4t64-8.5.0-2ubuntu10.6 0.00070 false
CVE-2025-10148 Anchore CVE Low libcurl4-openssl-dev-8.5.0-2ubuntu10.6 0.00070 false
CVE-2025-10148 Twistlock CVE Low curl-8.5.0-2ubuntu10.6 0.00070 false
CVE-2025-3360 Anchore CVE Low libglib2.0-data-2.80.0-6ubuntu3.2 0.00068 false
CVE-2025-3360 Anchore CVE Low libglib2.0-0t64-2.80.0-6ubuntu3.5 0.00068 false
CVE-2025-3360 Anchore CVE Low libglib2.0-bin-2.80.0-6ubuntu3.5 0.00068 false
CVE-2025-1365 Anchore CVE Medium libelf1t64-0.190-1.1build4.1 0.00067 false
CVE-2025-1365 Twistlock CVE Medium elfutils-0.190-1.1build4.1 0.00067 false
CVE-2025-13836 Anchore CVE Medium libpython3.12-stdlib-3.12.3-1ubuntu0.9 0.00066 false
CVE-2025-13836 Anchore CVE Medium python3.12-3.12.3-1ubuntu0.9 0.00066 false
CVE-2025-13836 Anchore CVE Medium libpython3.12-minimal-3.12.3-1ubuntu0.9 0.00066 false
CVE-2025-13836 Anchore CVE Medium python3.12-minimal-3.12.3-1ubuntu0.9 0.00066 false
CVE-2025-12084 Anchore CVE Medium libpython3.12-stdlib-3.12.3-1ubuntu0.9 0.00064 false
CVE-2025-12084 Anchore CVE Medium python3.12-3.12.3-1ubuntu0.9 0.00064 false
CVE-2025-12084 Anchore CVE Medium python3.12-minimal-3.12.3-1ubuntu0.9 0.00064 false
CVE-2025-12084 Anchore CVE Medium libpython3.12-minimal-3.12.3-1ubuntu0.9 0.00064 false
CVE-2025-1371 Anchore CVE Medium libelf1t64-0.190-1.1build4.1 0.00055 false
CVE-2025-1371 Twistlock CVE Medium elfutils-0.190-1.1build4.1 0.00055 false
CVE-2025-6052 Anchore CVE Low libglib2.0-data-2.80.0-6ubuntu3.2 0.00047 false
CVE-2025-6052 Twistlock CVE Low glib2.0-2.80.0-6ubuntu3.2 0.00047 false
CVE-2025-6052 Twistlock CVE Low glib2.0-2.80.0-6ubuntu3.5 0.00047 false
CVE-2025-6052 Anchore CVE Low libglib2.0-0t64-2.80.0-6ubuntu3.5 0.00047 false
CVE-2025-6052 Anchore CVE Low libglib2.0-bin-2.80.0-6ubuntu3.5 0.00047 false
CVE-2025-14512 Anchore CVE Medium libglib2.0-0t64-2.80.0-6ubuntu3.5 0.00037 false
CVE-2025-14512 Anchore CVE Medium libglib2.0-bin-2.80.0-6ubuntu3.5 0.00037 false
CVE-2025-14512 Anchore CVE Medium libglib2.0-data-2.80.0-6ubuntu3.2 0.00037 false
CVE-2025-5222 Twistlock CVE Low icu-74.2-1ubuntu3.1 0.00027 false
CVE-2025-5222 Anchore CVE Low libicu74-74.2-1ubuntu3.1 0.00027 false
CVE-2025-9086 Twistlock CVE Low curl-8.5.0-2ubuntu10.6 0.00022 false
CVE-2025-9086 Anchore CVE Low libcurl4t64-8.5.0-2ubuntu10.6 0.00022 false
CVE-2025-9086 Anchore CVE Low libcurl4-openssl-dev-8.5.0-2ubuntu10.6 0.00022 false
CVE-2025-60753 Anchore CVE Low libarchive13t64-3.7.2-2ubuntu0.5 0.00020 false
CVE-2025-5918 Anchore CVE Low libarchive13t64-3.7.2-2ubuntu0.5 0.00019 false
CVE-2025-13837 Anchore CVE Medium libpython3.12-minimal-3.12.3-1ubuntu0.9 0.00018 false
CVE-2025-13837 Anchore CVE Medium python3.12-minimal-3.12.3-1ubuntu0.9 0.00018 false
CVE-2025-13837 Anchore CVE Medium python3.12-3.12.3-1ubuntu0.9 0.00018 false
CVE-2025-13837 Anchore CVE Medium libpython3.12-stdlib-3.12.3-1ubuntu0.9 0.00018 false
CVE-2025-66382 Anchore CVE Medium libexpat1-2.6.1-2ubuntu0.3 0.00017 false
CVE-2025-66382 Twistlock CVE Medium expat-2.6.1-2ubuntu0.3 0.00017 false
CVE-2025-13601 Anchore CVE Medium libglib2.0-data-2.80.0-6ubuntu3.2 0.00015 false
CVE-2025-13601 Anchore CVE Medium libglib2.0-0t64-2.80.0-6ubuntu3.5 0.00015 false
CVE-2025-13601 Anchore CVE Medium libglib2.0-bin-2.80.0-6ubuntu3.5 0.00015 false
CVE-2024-25260 Anchore CVE Low libelf1t64-0.190-1.1build4.1 0.00014 false
CVE-2024-25260 Twistlock CVE Low elfutils-0.190-1.1build4.1 0.00014 false
CVE-2025-8732 Anchore CVE Low libxml2-2.9.14+dfsg-1.3ubuntu3.6 0.00010 false
USN-7532-1 OSCAP Compliance Medium N/A N/A
USN-7369-1 OSCAP Compliance Medium N/A N/A

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/triton-inference-server/server&tag=24.12.01&branch=master

Tasks

Contributor:

  • Apply the StatusReview label to this issue for a merge request review and wait for feedback

OR

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue for a VAT justifications review and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Review or Verification label will be removed and the issue will be sent back to To-Do. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Review or Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by CHORE_TOKEN
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information