Skip to content

Commit 316ece9

Browse files
Merge branch 'master' into fixRC-PT2.8
2 parents 74d3ac2 + 3f71458 commit 316ece9

File tree

13 files changed

+468
-13
lines changed

13 files changed

+468
-13
lines changed

pytorch/training/docker/2.7/py3/Dockerfile.cpu

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -334,7 +334,8 @@ RUN pip install --no-cache-dir -U \
334334
"sagemaker>=2.9.0,<3" \
335335
"sagemaker-experiments<1" \
336336
sagemaker-pytorch-training \
337-
sagemaker-training
337+
sagemaker-training \
338+
sniffio
338339

339340
# Install extra packages
340341
RUN pip install --no-cache-dir -U \

pytorch/training/docker/2.7/py3/cu128/Dockerfile.gpu

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -205,7 +205,8 @@ RUN pip install --no-cache-dir -U \
205205
"sagemaker>=2.9.0,<3" \
206206
"sagemaker-experiments<1" \
207207
sagemaker-pytorch-training \
208-
sagemaker-training
208+
sagemaker-training \
209+
sniffio
209210

210211
# Install extra packages
211212
RUN pip install --no-cache-dir -U \

pytorch/training/docker/2.8/py3/Dockerfile.cpu

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -188,7 +188,7 @@ RUN pip install --no-cache-dir \
188188
"requests>=2.32.0" \
189189
"setuptools>=70.0.0" \
190190
"urllib3>=2.5.0" \
191-
"awscli" \
191+
awscli \
192192
opencv-python==4.11.0.86 \
193193
mpi4py \
194194
jinja2>=3.1.6 \
@@ -282,10 +282,12 @@ WORKDIR /
282282
# Install SM packages
283283
RUN pip install --no-cache-dir -U \
284284
smclarify \
285-
"sagemaker>=2" \
285+
"sagemaker==2.254.1" \
286286
sagemaker-experiments \
287287
sagemaker-pytorch-training \
288-
sagemaker-training
288+
sagemaker-training \
289+
# Add sniffio explicitly as it's not included in sagemaker==2.254.1 dependencies
290+
sniffio
289291

290292
# Install extra packages
291293
RUN pip install --no-cache-dir -U \

pytorch/training/docker/2.8/py3/cu129/Dockerfile.gpu

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -250,10 +250,12 @@ RUN pip install --no-cache-dir -U \
250250
"awscli<1.42.50" \
251251
"boto3<1.40.50" \
252252
smclarify \
253-
"sagemaker>=2" \
253+
"sagemaker==2.254.1" \
254254
sagemaker-experiments \
255255
sagemaker-pytorch-training \
256-
sagemaker-training
256+
sagemaker-training \
257+
# Add sniffio explicitly as it's not included in sagemaker==2.254.1 dependencies
258+
sniffio
257259

258260
# Install extra packages
259261
RUN pip install --no-cache-dir -U \

release_images_inference.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ release_images:
133133
cuda_version: "cu128"
134134
example: False
135135
disable_sm_tag: True
136-
force_release: False
136+
force_release: True
137137
11:
138138
framework: "djl"
139139
version: "0.35.0"

sglang/buildspec-sm.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,7 @@ images:
4444
os_version: &OS_VERSION ubuntu22.04
4545
tag: !join [ *VERSION, "-", *DEVICE_TYPE, "-", *TAG_PYTHON_VERSION, "-", *CUDA_VERSION, "-", *OS_VERSION, "-sagemaker" ]
4646
latest_release_tag: !join [ *VERSION, "-", *DEVICE_TYPE, "-", *TAG_PYTHON_VERSION, "-", *CUDA_VERSION, "-", *OS_VERSION, "-sagemaker" ]
47+
skip_build: "False"
4748
docker_file: !join [ *FRAMEWORK, /, *ARCH_TYPE, /, *DEVICE_TYPE, /Dockerfile ]
4849
target: sglang-sagemaker
4950
build: true

tensorflow/training/buildspec-2-19-sm.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ framework: &FRAMEWORK tensorflow
55
version: &VERSION 2.19.0
66
short_version: &SHORT_VERSION "2.19"
77
arch_type: x86
8-
# autopatch_build: "True"
8+
autopatch_build: "True"
99

1010
repository_info:
1111
training_repository: &TRAINING_REPOSITORY

tensorflow/training/docker/2.19/py3/Dockerfile.sagemaker.cpu.os_scan_allowlist.json

Lines changed: 213 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -273,5 +273,218 @@
273273
"title": "CVE-2025-57319 - fast-redact",
274274
"reason_to_ignore": "N/A"
275275
}
276+
],
277+
"curl/libcurl": [
278+
{
279+
"description": "When libcurl is asked to perform automatic gzip decompression of content-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option, **using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would make libcurl perform a buffer overflow.",
280+
"vulnerability_id": "CVE-2025-0725",
281+
"name": "CVE-2025-0725",
282+
"package_name": "curl/libcurl",
283+
"package_details": {
284+
"file_path": "/usr/local/lib/python3.12/site-packages/tensorflow/include/external/curl/include/curl/curlver.h",
285+
"name": "curl/libcurl",
286+
"package_manager": "GENERIC",
287+
"version": "8.11.0",
288+
"release": null
289+
},
290+
"remediation": {
291+
"recommendation": {
292+
"text": "None Provided"
293+
}
294+
},
295+
"cvss_v3_score": 7.3,
296+
"cvss_v30_score": 0.0,
297+
"cvss_v31_score": 7.3,
298+
"cvss_v2_score": 0.0,
299+
"cvss_v3_severity": "HIGH",
300+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0725",
301+
"source": "NVD",
302+
"severity": "HIGH",
303+
"status": "ACTIVE",
304+
"title": "CVE-2025-0725 - curl/libcurl",
305+
"reason_to_ignore": "N/A"
306+
},
307+
{
308+
"description": "1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path='/'`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic makes curl read outside a heap buffer boundary\n\nThe bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.\n\nThe presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.",
309+
"vulnerability_id": "CVE-2025-9086",
310+
"name": "CVE-2025-9086",
311+
"package_name": "curl/libcurl",
312+
"package_details": {
313+
"file_path": "/usr/local/lib/python3.12/site-packages/tensorflow/include/external/curl/include/curl/curlver.h",
314+
"name": "curl/libcurl",
315+
"package_manager": "GENERIC",
316+
"version": "8.11.0",
317+
"release": null
318+
},
319+
"remediation": {
320+
"recommendation": {
321+
"text": "None Provided"
322+
}
323+
},
324+
"cvss_v3_score": 7.5,
325+
"cvss_v30_score": 0.0,
326+
"cvss_v31_score": 7.5,
327+
"cvss_v2_score": 0.0,
328+
"cvss_v3_severity": "HIGH",
329+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9086",
330+
"source": "NVD",
331+
"severity": "HIGH",
332+
"status": "ACTIVE",
333+
"title": "CVE-2025-9086 - curl/libcurl",
334+
"reason_to_ignore": "N/A"
335+
}
336+
],
337+
"glob": [
338+
{
339+
"description": "Glob matches files using patterns the shell uses. Starting in version 10.2.0 and prior to versions 10.5.0 and 11.1.0, the glob CLI contains a command injection vulnerability in its -c/--cmd option that allows arbitrary command execution when processing files with malicious names. When glob -c <command> <patterns> are used, matched filenames are passed to a shell with shell: true, enabling shell metacharacters in filenames to trigger command injection and achieve arbitrary code execution under the user or CI account privileges. This issue has been patched in versions 10.5.0 and 11.1.0.",
340+
"vulnerability_id": "CVE-2025-64756",
341+
"name": "CVE-2025-64756",
342+
"package_name": "glob",
343+
"package_details": {
344+
"file_path": "/usr/local/lib/python3.12/site-packages/jupyterlab/staging/yarn.lock",
345+
"name": "glob",
346+
"package_manager": "NODE",
347+
"version": "10.3.10",
348+
"release": null
349+
},
350+
"remediation": {
351+
"recommendation": {
352+
"text": "None Provided"
353+
}
354+
},
355+
"cvss_v3_score": 7.5,
356+
"cvss_v30_score": 0.0,
357+
"cvss_v31_score": 7.5,
358+
"cvss_v2_score": 0.0,
359+
"cvss_v3_severity": "HIGH",
360+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64756",
361+
"source": "NVD",
362+
"severity": "HIGH",
363+
"status": "ACTIVE",
364+
"title": "CVE-2025-64756 - glob",
365+
"reason_to_ignore": "N/A"
366+
}
367+
],
368+
"vega": [
369+
{
370+
"description": "Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. In Vega prior to version 6.2.0, applications meeting 2 conditions are at risk of arbitrary JavaScript code execution, even if \"safe mode\" expressionInterpreter is used. They are vulnerable if they use `vega` in an application that attaches `vega` library and a `vega.View` instance similar to the Vega Editor to the global `window` and if they allow user-defined Vega `JSON` definitions (vs JSON that was is only provided through source code). Patches are available in the following Vega applications. If using the latest Vega line (6.x), upgrade to `vega` `6.2.0` / `vega-expression` `6.1.0` / `vega-interpreter` `2.2.1` (if using AST evaluator mode). If using Vega in a non-ESM environment, upgrade to `vega-expression` `5.2.1` / `1.2.1` (if using AST evaluator mode). Some workarounds are available. Do not attach `vega` View instances to global variables, and do not attach `vega` to the global wi",
371+
"vulnerability_id": "CVE-2025-59840",
372+
"name": "CVE-2025-59840",
373+
"package_name": "vega",
374+
"package_details": {
375+
"file_path": "/usr/local/lib/python3.12/site-packages/jupyterlab/staging/yarn.lock",
376+
"name": "vega",
377+
"package_manager": "NODE",
378+
"version": "5.33.0",
379+
"release": null
380+
},
381+
"remediation": {
382+
"recommendation": {
383+
"text": "None Provided"
384+
}
385+
},
386+
"cvss_v3_score": 8.1,
387+
"cvss_v30_score": 0.0,
388+
"cvss_v31_score": 8.1,
389+
"cvss_v2_score": 0.0,
390+
"cvss_v3_severity": "HIGH",
391+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59840",
392+
"source": "NVD",
393+
"severity": "HIGH",
394+
"status": "ACTIVE",
395+
"title": "CVE-2025-59840 - vega, vega-expression and 2 more",
396+
"reason_to_ignore": "N/A"
397+
}
398+
],
399+
"vega-expression": [
400+
{
401+
"description": "Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. In Vega prior to version 6.2.0, applications meeting 2 conditions are at risk of arbitrary JavaScript code execution, even if \"safe mode\" expressionInterpreter is used. They are vulnerable if they use `vega` in an application that attaches `vega` library and a `vega.View` instance similar to the Vega Editor to the global `window` and if they allow user-defined Vega `JSON` definitions (vs JSON that was is only provided through source code). Patches are available in the following Vega applications. If using the latest Vega line (6.x), upgrade to `vega` `6.2.0` / `vega-expression` `6.1.0` / `vega-interpreter` `2.2.1` (if using AST evaluator mode). If using Vega in a non-ESM environment, upgrade to `vega-expression` `5.2.1` / `1.2.1` (if using AST evaluator mode). Some workarounds are available. Do not attach `vega` View instances to global variables, and do not attach `vega` to the global wi",
402+
"vulnerability_id": "CVE-2025-59840",
403+
"name": "CVE-2025-59840",
404+
"package_name": "vega-expression",
405+
"package_details": {
406+
"file_path": "/usr/local/lib/python3.12/site-packages/jupyterlab/staging/yarn.lock",
407+
"name": "vega-expression",
408+
"package_manager": "NODE",
409+
"version": "5.0.1",
410+
"release": null
411+
},
412+
"remediation": {
413+
"recommendation": {
414+
"text": "None Provided"
415+
}
416+
},
417+
"cvss_v3_score": 8.1,
418+
"cvss_v30_score": 0.0,
419+
"cvss_v31_score": 8.1,
420+
"cvss_v2_score": 0.0,
421+
"cvss_v3_severity": "HIGH",
422+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59840",
423+
"source": "NVD",
424+
"severity": "HIGH",
425+
"status": "ACTIVE",
426+
"title": "CVE-2025-59840 - vega, vega-expression and 2 more",
427+
"reason_to_ignore": "N/A"
428+
},
429+
{
430+
"description": "Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. In Vega prior to version 6.2.0, applications meeting 2 conditions are at risk of arbitrary JavaScript code execution, even if \"safe mode\" expressionInterpreter is used. They are vulnerable if they use `vega` in an application that attaches `vega` library and a `vega.View` instance similar to the Vega Editor to the global `window` and if they allow user-defined Vega `JSON` definitions (vs JSON that was is only provided through source code). Patches are available in the following Vega applications. If using the latest Vega line (6.x), upgrade to `vega` `6.2.0` / `vega-expression` `6.1.0` / `vega-interpreter` `2.2.1` (if using AST evaluator mode). If using Vega in a non-ESM environment, upgrade to `vega-expression` `5.2.1` / `1.2.1` (if using AST evaluator mode). Some workarounds are available. Do not attach `vega` View instances to global variables, and do not attach `vega` to the global wi",
431+
"vulnerability_id": "CVE-2025-59840",
432+
"name": "CVE-2025-59840",
433+
"package_name": "vega-expression",
434+
"package_details": {
435+
"file_path": "/usr/local/lib/python3.12/site-packages/jupyterlab/staging/yarn.lock",
436+
"name": "vega-expression",
437+
"package_manager": "NODE",
438+
"version": "5.2.0",
439+
"release": null
440+
},
441+
"remediation": {
442+
"recommendation": {
443+
"text": "None Provided"
444+
}
445+
},
446+
"cvss_v3_score": 8.1,
447+
"cvss_v30_score": 0.0,
448+
"cvss_v31_score": 8.1,
449+
"cvss_v2_score": 0.0,
450+
"cvss_v3_severity": "HIGH",
451+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59840",
452+
"source": "NVD",
453+
"severity": "HIGH",
454+
"status": "ACTIVE",
455+
"title": "CVE-2025-59840 - vega, vega-expression and 2 more",
456+
"reason_to_ignore": "N/A"
457+
}
458+
],
459+
"vega-interpreter": [
460+
{
461+
"description": "Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. In Vega prior to version 6.2.0, applications meeting 2 conditions are at risk of arbitrary JavaScript code execution, even if \"safe mode\" expressionInterpreter is used. They are vulnerable if they use `vega` in an application that attaches `vega` library and a `vega.View` instance similar to the Vega Editor to the global `window` and if they allow user-defined Vega `JSON` definitions (vs JSON that was is only provided through source code). Patches are available in the following Vega applications. If using the latest Vega line (6.x), upgrade to `vega` `6.2.0` / `vega-expression` `6.1.0` / `vega-interpreter` `2.2.1` (if using AST evaluator mode). If using Vega in a non-ESM environment, upgrade to `vega-expression` `5.2.1` / `1.2.1` (if using AST evaluator mode). Some workarounds are available. Do not attach `vega` View instances to global variables, and do not attach `vega` to the global wi",
462+
"vulnerability_id": "CVE-2025-59840",
463+
"name": "CVE-2025-59840",
464+
"package_name": "vega-interpreter",
465+
"package_details": {
466+
"file_path": "/usr/local/lib/python3.12/site-packages/jupyterlab/staging/yarn.lock",
467+
"name": "vega-interpreter",
468+
"package_manager": "NODE",
469+
"version": "1.0.5",
470+
"release": null
471+
},
472+
"remediation": {
473+
"recommendation": {
474+
"text": "None Provided"
475+
}
476+
},
477+
"cvss_v3_score": 8.1,
478+
"cvss_v30_score": 0.0,
479+
"cvss_v31_score": 8.1,
480+
"cvss_v2_score": 0.0,
481+
"cvss_v3_severity": "HIGH",
482+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59840",
483+
"source": "NVD",
484+
"severity": "HIGH",
485+
"status": "ACTIVE",
486+
"title": "CVE-2025-59840 - vega, vega-expression and 2 more",
487+
"reason_to_ignore": "N/A"
488+
}
276489
]
277490
}

tensorflow/training/docker/2.19/py3/cu125/Dockerfile.gpu

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -330,6 +330,9 @@ RUN pip install --no-cache-dir -U \
330330
--no-build-isolation
331331

332332

333+
# Pin numpy to 1.26.4
334+
RUN ${PIP} install --no-cache-dir -U "numpy==1.26.4"
335+
333336
# https://github.com/tensorflow/models/issues/9267
334337
# tf-models does not respect existing installations of TF and always installs open source TF
335338
RUN ${PIP} install \

0 commit comments

Comments
 (0)