0.7.0
2 years ago
2 months ago
Known vulnerabilities in the nvidia-pytriton package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
nvidia-pytriton is a PyTriton - Flask/FastAPI-like interface to simplify Triton's deployment in Python environments. Affected versions of this package are vulnerable to Access Control Bypass via This vulnerability is only exploitable when using the default Triton Server binary bundled in It is possible to update the Triton Server binary to a patched version independently of PyTriton; See Building binaries from source. How to fix Access Control Bypass? There is no fixed version for | [0,) |
nvidia-pytriton is a PyTriton - Flask/FastAPI-like interface to simplify Triton's deployment in Python environments. Affected versions of this package are vulnerable to Command Injection via Note: This vulnerability is only exploitable when using the default bundled Python backend How to fix Command Injection? There is no fixed version for | [0,) |
nvidia-pytriton is a PyTriton - Flask/FastAPI-like interface to simplify Triton's deployment in Python environments. Affected versions of this package are vulnerable to Double Free via the cancellation handling for gRPC non-decoupled inference. An attacker can cause a double free by sending multiple requests, causing a stream to be cancelled before it is processed. A successful exploit of this vulnerability might result in a denial of service. Note: This vulnerability is only exploitable when using the default bundled Triton Server binary How to fix Double Free? There is no fixed version for | [0,) |
nvidia-pytriton is a PyTriton - Flask/FastAPI-like interface to simplify Triton's deployment in Python environments. Affected versions of this package are vulnerable to Out-of-bounds Write via the HTTP and Sagemaker request handler. An attacker could cause an out-of-bounds write through by sending an HTTP request with chunked transfer encoding containing a large number of chunks. A successful exploit of this vulnerability might lead to denial of service. This vulnerability is only exploitable when using the default Triton Server binary bundled in It is possible to update the Triton Server binary to a patched version independently of PyTriton; See Building binaries from source. How to fix Out-of-bounds Write? There is no fixed version for | [0,) |
nvidia-pytriton is a PyTriton - Flask/FastAPI-like interface to simplify Triton's deployment in Python environments. Affected versions of this package are vulnerable to Incorrect Initialization of Resource via CUDA SHM region registration. An attacker can cause a network issue, leading to information disclosure via detailed error information. Note: This vulnerability is only applicable when deployed on Linux systems This vulnerability is only exploitable when using the default bundled Triton Server How to fix Incorrect Initialization of Resource? Upgrade | [0.4.1,0.5.8) |
nvidia-pytriton is a PyTriton - Flask/FastAPI-like interface to simplify Triton's deployment in Python environments. Affected versions of this package are vulnerable to Integer Overflow or Wraparound via element count handling. An attacker could cause a denial of service and data tampering through specially crafted inputs containing overly large or negative values. This vulnerability is only exploitable when using the default bundled Triton Server binary How to fix Integer Overflow or Wraparound? There is no fixed version for | [0,) |
nvidia-pytriton is a PyTriton - Flask/FastAPI-like interface to simplify Triton's deployment in Python environments. Affected versions of this package are vulnerable to Out-of-bounds Read via the Note: This vulnerability is only exploitable when using the default bundled Python backend How to fix Out-of-bounds Read? There is no fixed version for | [0,) |
nvidia-pytriton is a PyTriton - Flask/FastAPI-like interface to simplify Triton's deployment in Python environments. Affected versions of this package are vulnerable to Uncontrolled Recursion via the This vulnerability is only exploitable when using the default bundled Triton Server binary How to fix Uncontrolled Recursion? There is no fixed version for | [0,) |
nvidia-pytriton is a PyTriton - Flask/FastAPI-like interface to simplify Triton's deployment in Python environments. Affected versions of this package are vulnerable to Stack-based Buffer Overflow via the memory allocation security in HTTP and Sagemaker request handler. An attacker could cause a stack buffer overflow by using specially crafted inputs. A successful exploit of this vulnerability might lead to remote code execution, denial of service, information disclosure, and data tampering. Note: This vulnerability is only exploitable when using the default bundled Triton Server How to fix Stack-based Buffer Overflow? There is no fixed version for | [0,) |
nvidia-pytriton is a PyTriton - Flask/FastAPI-like interface to simplify Triton's deployment in Python environments. Affected versions of this package are vulnerable to Buffer Access with Incorrect Length Value via the Note: This vulnerability is only exploitable when using the default bundled Python backend How to fix Buffer Access with Incorrect Length Value? A fix was pushed into the | [0,) |
nvidia-pytriton is a PyTriton - Flask/FastAPI-like interface to simplify Triton's deployment in Python environments. Affected versions of this package are vulnerable to Improper Output Neutralization for Logs via the logging extension. An attacker can inject forged logs and executable commands by injecting arbitrary data as a new log entry. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. This vulnerability is only exploitable when using the default Triton Server binary bundled in /pytriton/tritonserver/bin/tritonserver. It is possible to update the Triton Server binary to a patched version independently of PyTriton; See Building binaries from source. How to fix Improper Output Neutralization for Logs? Upgrade | [,0.5.8) |
nvidia-pytriton is a PyTriton - Flask/FastAPI-like interface to simplify Triton's deployment in Python environments. Affected versions of this package are vulnerable to Buffer Access with Incorrect Length Value via the Note: This vulnerability is only exploitable when using the default bundled Python backend How to fix Buffer Access with Incorrect Length Value? There is no fixed version for | [0,) |
nvidia-pytriton is a PyTriton - Flask/FastAPI-like interface to simplify Triton's deployment in Python environments. Affected versions of this package are vulnerable to Information Exposure via the How to fix Information Exposure? There is no fixed version for | [0,) |
nvidia-pytriton is a PyTriton - Flask/FastAPI-like interface to simplify Triton's deployment in Python environments. Affected versions of this package are vulnerable to Out-of-bounds Read via the How to fix Out-of-bounds Read? There is no fixed version for | [0,) |