NVIDIA has released a software update for NVIDIA Triton Inference Server to address the issue disclosed in this bulletin. To protect your system, install the latest release from the Triton Inference Server Releases page on GitHub, and view the Secure Deployment Considerations Guide. Go to NVIDIA Product Security. Details This section provides a summary of potential vulnerabilities that this security update addresses and their impact. The description uses CWE™, and the base score and vector use CVSS v3.1 standards. CVE ID | Description | Vector | Base Score | Severity | CWE | Impacts —|—|—|—|—|—|— CVE-2024-0087 | NVIDIA Triton Inference Server for Linux contains a vulnerability where a user can set the logging location to an arbitrary file. If this file exists, logs are appended to the file. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. | AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:H | 9.0 | Critical | CWE-73 | Code execution, denial of service, escalation of privileges, information disclosure, data tampering CVE-2024-0100 | NVIDIA Triton Inference Server for Linux contains a vulnerability in the tracing API, where a user can corrupt system files. A successful exploit of this vulnerability might lead to denial of service and data tampering. | AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H | 6.5 | Medium | CWE-73 | Denial of service, data tampering CVE-2024-0088 |…Read More
Security Bulletin: Triton Inference Server – April 2024

