chore(findings): opensource/triton-inference-server/server
Summary
opensource/triton-inference-server/server has 116 new findings discovered during continuous monitoring.
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/triton-inference-server/server&tag=24.12.01&branch=master
EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.
KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.
| id | source | severity | package | impact | workaround | epss_score | kev |
|---|---|---|---|---|---|---|---|
| CVE-2018-6952 | Twistlock CVE | Low | patch-2.7.6-7build3 | 0.11805 | false | ||
| CVE-2018-6952 | Anchore CVE | Low | patch-2.7.6-7build3 | 0.11805 | false | ||
| CVE-2025-1352 | Anchore CVE | Low | libelf1t64-0.190-1.1build4.1 | 0.00398 | false | ||
| CVE-2025-1352 | Twistlock CVE | Low | elfutils-0.190-1.1build4.1 | 0.00398 | false | ||
| CVE-2025-1180 | Twistlock CVE | Medium | binutils-2.42-4ubuntu2.8 | 0.00279 | false | ||
| CVE-2025-1180 | Anchore CVE | Medium | libctf0-2.42-4ubuntu2.8 | 0.00279 | false | ||
| CVE-2025-1180 | Anchore CVE | Medium | libctf-nobfd0-2.42-4ubuntu2.8 | 0.00279 | false | ||
| CVE-2025-1180 | Anchore CVE | Medium | libsframe1-2.42-4ubuntu2.8 | 0.00279 | false | ||
| CVE-2025-1180 | Anchore CVE | Medium | binutils-common-2.42-4ubuntu2.8 | 0.00279 | false | ||
| CVE-2025-1180 | Anchore CVE | Medium | libbinutils-2.42-4ubuntu2.8 | 0.00279 | false | ||
| CVE-2025-1180 | Anchore CVE | Medium | binutils-2.42-4ubuntu2.8 | 0.00279 | false | ||
| CVE-2025-1180 | Anchore CVE | Medium | libgprofng0-2.42-4ubuntu2.8 | 0.00279 | false | ||
| CVE-2025-1180 | Anchore CVE | Medium | binutils-x86-64-linux-gnu-2.42-4ubuntu2.8 | 0.00279 | false | ||
| CVE-2021-45261 | Twistlock CVE | Low | patch-2.7.6-7build3 | 0.00266 | false | ||
| CVE-2021-45261 | Anchore CVE | Low | patch-2.7.6-7build3 | 0.00266 | false | ||
| CVE-2025-14087 | Anchore CVE | Medium | libglib2.0-data-2.80.0-6ubuntu3.2 | 0.00259 | false | ||
| CVE-2025-14087 | Anchore CVE | Medium | libglib2.0-bin-2.80.0-6ubuntu3.5 | 0.00259 | false | ||
| CVE-2025-14087 | Anchore CVE | Medium | libglib2.0-0t64-2.80.0-6ubuntu3.5 | 0.00259 | false | ||
| CVE-2017-13716 | Twistlock CVE | Low | binutils-2.42-4ubuntu2.8 | 0.00237 | false | ||
| CVE-2017-13716 | Anchore CVE | Low | libctf-nobfd0-2.42-4ubuntu2.8 | 0.00237 | false | ||
| CVE-2017-13716 | Anchore CVE | Low | libsframe1-2.42-4ubuntu2.8 | 0.00237 | false | ||
| CVE-2017-13716 | Anchore CVE | Low | binutils-2.42-4ubuntu2.8 | 0.00237 | false | ||
| CVE-2017-13716 | Anchore CVE | Low | libgprofng0-2.42-4ubuntu2.8 | 0.00237 | false | ||
| CVE-2017-13716 | Anchore CVE | Low | binutils-common-2.42-4ubuntu2.8 | 0.00237 | false | ||
| CVE-2017-13716 | Anchore CVE | Low | libbinutils-2.42-4ubuntu2.8 | 0.00237 | false | ||
| CVE-2017-13716 | Anchore CVE | Low | libctf0-2.42-4ubuntu2.8 | 0.00237 | false | ||
| CVE-2017-13716 | Anchore CVE | Low | binutils-x86-64-linux-gnu-2.42-4ubuntu2.8 | 0.00237 | false | ||
| CVE-2025-1152 | Twistlock CVE | Low | binutils-2.42-4ubuntu2.8 | 0.00181 | false | ||
| CVE-2025-1152 | Anchore CVE | Low | binutils-x86-64-linux-gnu-2.42-4ubuntu2.8 | 0.00181 | false | ||
| CVE-2025-1152 | Anchore CVE | Low | binutils-common-2.42-4ubuntu2.8 | 0.00181 | false | ||
| CVE-2025-1152 | Anchore CVE | Low | libctf0-2.42-4ubuntu2.8 | 0.00181 | false | ||
| CVE-2025-1152 | Anchore CVE | Low | libbinutils-2.42-4ubuntu2.8 | 0.00181 | false | ||
| CVE-2025-1152 | Anchore CVE | Low | libgprofng0-2.42-4ubuntu2.8 | 0.00181 | false | ||
| CVE-2025-1152 | Anchore CVE | Low | libsframe1-2.42-4ubuntu2.8 | 0.00181 | false | ||
| CVE-2025-1152 | Anchore CVE | Low | binutils-2.42-4ubuntu2.8 | 0.00181 | false | ||
| CVE-2025-1152 | Anchore CVE | Low | libctf-nobfd0-2.42-4ubuntu2.8 | 0.00181 | false | ||
| CVE-2025-1150 | Anchore CVE | Low | libsframe1-2.42-4ubuntu2.8 | 0.00181 | false | ||
| CVE-2025-1150 | Anchore CVE | Low | libctf-nobfd0-2.42-4ubuntu2.8 | 0.00181 | false | ||
| CVE-2025-1150 | Anchore CVE | Low | libctf0-2.42-4ubuntu2.8 | 0.00181 | false | ||
| CVE-2025-1150 | Anchore CVE | Low | libgprofng0-2.42-4ubuntu2.8 | 0.00181 | false | ||
| CVE-2025-1150 | Anchore CVE | Low | binutils-2.42-4ubuntu2.8 | 0.00181 | false | ||
| CVE-2025-1150 | Anchore CVE | Low | binutils-x86-64-linux-gnu-2.42-4ubuntu2.8 | 0.00181 | false | ||
| CVE-2025-1150 | Anchore CVE | Low | binutils-common-2.42-4ubuntu2.8 | 0.00181 | false | ||
| CVE-2025-1150 | Anchore CVE | Low | libbinutils-2.42-4ubuntu2.8 | 0.00181 | false | ||
| CVE-2025-1151 | Anchore CVE | Low | binutils-x86-64-linux-gnu-2.42-4ubuntu2.8 | 0.00167 | false | ||
| CVE-2025-1151 | Anchore CVE | Low | libctf0-2.42-4ubuntu2.8 | 0.00167 | false | ||
| CVE-2025-1151 | Anchore CVE | Low | libsframe1-2.42-4ubuntu2.8 | 0.00167 | false | ||
| CVE-2025-1151 | Anchore CVE | Low | libbinutils-2.42-4ubuntu2.8 | 0.00167 | false | ||
| CVE-2025-1151 | Anchore CVE | Low | libgprofng0-2.42-4ubuntu2.8 | 0.00167 | false | ||
| CVE-2025-1151 | Anchore CVE | Low | libctf-nobfd0-2.42-4ubuntu2.8 | 0.00167 | false | ||
| CVE-2025-1151 | Anchore CVE | Low | binutils-2.42-4ubuntu2.8 | 0.00167 | false | ||
| CVE-2025-1151 | Anchore CVE | Low | binutils-common-2.42-4ubuntu2.8 | 0.00167 | false | ||
| CVE-2025-0167 | Anchore CVE | Low | libcurl4-openssl-dev-8.5.0-2ubuntu10.6 | 0.00160 | false | ||
| CVE-2025-0167 | Anchore CVE | Low | libcurl4t64-8.5.0-2ubuntu10.6 | 0.00160 | false | ||
| CVE-2025-0167 | Twistlock CVE | Low | curl-8.5.0-2ubuntu10.6 | 0.00160 | false | ||
| CVE-2025-59375 | Anchore CVE | Medium | libexpat1-2.6.1-2ubuntu0.3 | 0.00131 | false | ||
| CVE-2025-4373 | Anchore CVE | Medium | libglib2.0-data-2.80.0-6ubuntu3.2 | 0.00122 | false | ||
| CVE-2025-4373 | Twistlock CVE | Medium | glib2.0-2.80.0-6ubuntu3.2 | 0.00122 | false | ||
| CVE-2019-20633 | Anchore CVE | Low | patch-2.7.6-7build3 | 0.00115 | false | ||
| CVE-2025-1372 | Anchore CVE | Medium | libelf1t64-0.190-1.1build4.1 | 0.00104 | false | ||
| CVE-2025-1372 | Twistlock CVE | Medium | elfutils-0.190-1.1build4.1 | 0.00104 | false | ||
| CVE-2025-7039 | Anchore CVE | Low | libglib2.0-data-2.80.0-6ubuntu3.2 | 0.00093 | false | ||
| CVE-2025-7039 | Anchore CVE | Low | libglib2.0-0t64-2.80.0-6ubuntu3.5 | 0.00093 | false | ||
| CVE-2025-7039 | Anchore CVE | Low | libglib2.0-bin-2.80.0-6ubuntu3.5 | 0.00093 | false | ||
| CVE-2025-8277 | Anchore CVE | Low | libssh-4-0.10.6-2ubuntu0.2 | 0.00072 | false | ||
| CVE-2025-1377 | Anchore CVE | Medium | libelf1t64-0.190-1.1build4.1 | 0.00070 | false | ||
| CVE-2025-1377 | Twistlock CVE | Medium | elfutils-0.190-1.1build4.1 | 0.00070 | false | ||
| CVE-2025-1376 | Anchore CVE | Low | libelf1t64-0.190-1.1build4.1 | 0.00070 | false | ||
| CVE-2025-1376 | Twistlock CVE | Low | elfutils-0.190-1.1build4.1 | 0.00070 | false | ||
| CVE-2025-10148 | Anchore CVE | Low | libcurl4t64-8.5.0-2ubuntu10.6 | 0.00070 | false | ||
| CVE-2025-10148 | Anchore CVE | Low | libcurl4-openssl-dev-8.5.0-2ubuntu10.6 | 0.00070 | false | ||
| CVE-2025-10148 | Twistlock CVE | Low | curl-8.5.0-2ubuntu10.6 | 0.00070 | false | ||
| CVE-2025-3360 | Anchore CVE | Low | libglib2.0-data-2.80.0-6ubuntu3.2 | 0.00068 | false | ||
| CVE-2025-3360 | Anchore CVE | Low | libglib2.0-0t64-2.80.0-6ubuntu3.5 | 0.00068 | false | ||
| CVE-2025-3360 | Anchore CVE | Low | libglib2.0-bin-2.80.0-6ubuntu3.5 | 0.00068 | false | ||
| CVE-2025-1365 | Anchore CVE | Medium | libelf1t64-0.190-1.1build4.1 | 0.00067 | false | ||
| CVE-2025-1365 | Twistlock CVE | Medium | elfutils-0.190-1.1build4.1 | 0.00067 | false | ||
| CVE-2025-13836 | Anchore CVE | Medium | libpython3.12-stdlib-3.12.3-1ubuntu0.9 | 0.00066 | false | ||
| CVE-2025-13836 | Anchore CVE | Medium | python3.12-3.12.3-1ubuntu0.9 | 0.00066 | false | ||
| CVE-2025-13836 | Anchore CVE | Medium | libpython3.12-minimal-3.12.3-1ubuntu0.9 | 0.00066 | false | ||
| CVE-2025-13836 | Anchore CVE | Medium | python3.12-minimal-3.12.3-1ubuntu0.9 | 0.00066 | false | ||
| CVE-2025-12084 | Anchore CVE | Medium | libpython3.12-stdlib-3.12.3-1ubuntu0.9 | 0.00064 | false | ||
| CVE-2025-12084 | Anchore CVE | Medium | python3.12-3.12.3-1ubuntu0.9 | 0.00064 | false | ||
| CVE-2025-12084 | Anchore CVE | Medium | python3.12-minimal-3.12.3-1ubuntu0.9 | 0.00064 | false | ||
| CVE-2025-12084 | Anchore CVE | Medium | libpython3.12-minimal-3.12.3-1ubuntu0.9 | 0.00064 | false | ||
| CVE-2025-1371 | Anchore CVE | Medium | libelf1t64-0.190-1.1build4.1 | 0.00055 | false | ||
| CVE-2025-1371 | Twistlock CVE | Medium | elfutils-0.190-1.1build4.1 | 0.00055 | false | ||
| CVE-2025-6052 | Anchore CVE | Low | libglib2.0-data-2.80.0-6ubuntu3.2 | 0.00047 | false | ||
| CVE-2025-6052 | Twistlock CVE | Low | glib2.0-2.80.0-6ubuntu3.2 | 0.00047 | false | ||
| CVE-2025-6052 | Twistlock CVE | Low | glib2.0-2.80.0-6ubuntu3.5 | 0.00047 | false | ||
| CVE-2025-6052 | Anchore CVE | Low | libglib2.0-0t64-2.80.0-6ubuntu3.5 | 0.00047 | false | ||
| CVE-2025-6052 | Anchore CVE | Low | libglib2.0-bin-2.80.0-6ubuntu3.5 | 0.00047 | false | ||
| CVE-2025-14512 | Anchore CVE | Medium | libglib2.0-0t64-2.80.0-6ubuntu3.5 | 0.00037 | false | ||
| CVE-2025-14512 | Anchore CVE | Medium | libglib2.0-bin-2.80.0-6ubuntu3.5 | 0.00037 | false | ||
| CVE-2025-14512 | Anchore CVE | Medium | libglib2.0-data-2.80.0-6ubuntu3.2 | 0.00037 | false | ||
| CVE-2025-5222 | Twistlock CVE | Low | icu-74.2-1ubuntu3.1 | 0.00027 | false | ||
| CVE-2025-5222 | Anchore CVE | Low | libicu74-74.2-1ubuntu3.1 | 0.00027 | false | ||
| CVE-2025-9086 | Twistlock CVE | Low | curl-8.5.0-2ubuntu10.6 | 0.00022 | false | ||
| CVE-2025-9086 | Anchore CVE | Low | libcurl4t64-8.5.0-2ubuntu10.6 | 0.00022 | false | ||
| CVE-2025-9086 | Anchore CVE | Low | libcurl4-openssl-dev-8.5.0-2ubuntu10.6 | 0.00022 | false | ||
| CVE-2025-60753 | Anchore CVE | Low | libarchive13t64-3.7.2-2ubuntu0.5 | 0.00020 | false | ||
| CVE-2025-5918 | Anchore CVE | Low | libarchive13t64-3.7.2-2ubuntu0.5 | 0.00019 | false | ||
| CVE-2025-13837 | Anchore CVE | Medium | libpython3.12-minimal-3.12.3-1ubuntu0.9 | 0.00018 | false | ||
| CVE-2025-13837 | Anchore CVE | Medium | python3.12-minimal-3.12.3-1ubuntu0.9 | 0.00018 | false | ||
| CVE-2025-13837 | Anchore CVE | Medium | python3.12-3.12.3-1ubuntu0.9 | 0.00018 | false | ||
| CVE-2025-13837 | Anchore CVE | Medium | libpython3.12-stdlib-3.12.3-1ubuntu0.9 | 0.00018 | false | ||
| CVE-2025-66382 | Anchore CVE | Medium | libexpat1-2.6.1-2ubuntu0.3 | 0.00017 | false | ||
| CVE-2025-66382 | Twistlock CVE | Medium | expat-2.6.1-2ubuntu0.3 | 0.00017 | false | ||
| CVE-2025-13601 | Anchore CVE | Medium | libglib2.0-data-2.80.0-6ubuntu3.2 | 0.00015 | false | ||
| CVE-2025-13601 | Anchore CVE | Medium | libglib2.0-0t64-2.80.0-6ubuntu3.5 | 0.00015 | false | ||
| CVE-2025-13601 | Anchore CVE | Medium | libglib2.0-bin-2.80.0-6ubuntu3.5 | 0.00015 | false | ||
| CVE-2024-25260 | Anchore CVE | Low | libelf1t64-0.190-1.1build4.1 | 0.00014 | false | ||
| CVE-2024-25260 | Twistlock CVE | Low | elfutils-0.190-1.1build4.1 | 0.00014 | false | ||
| CVE-2025-8732 | Anchore CVE | Low | libxml2-2.9.14+dfsg-1.3ubuntu3.6 | 0.00010 | false | ||
| USN-7532-1 | OSCAP Compliance | Medium | N/A | N/A | |||
| USN-7369-1 | OSCAP Compliance | Medium | N/A | N/A |
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/triton-inference-server/server&tag=24.12.01&branch=master
Tasks
Contributor:
-
Apply the StatusReview label to this issue for a merge request reviewand wait for feedback
OR
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue for a VAT justifications reviewand wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
RevieworVerificationlabel will be removed and the issue will be sent back toTo-Do. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theRevieworVerificationlabel.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.