Skip to content

Commit 47e4a2b

Browse files
add setup tools to corepackages.json
1 parent 1b9cd89 commit 47e4a2b

File tree

5 files changed

+7
-63
lines changed

5 files changed

+7
-63
lines changed

tensorflow/training/buildspec-2-19-sm.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ framework: &FRAMEWORK tensorflow
55
version: &VERSION 2.19.0
66
short_version: &SHORT_VERSION "2.19"
77
arch_type: x86
8-
autopatch_build: "False"
8+
autopatch_build: "True"
99

1010
repository_info:
1111
training_repository: &TRAINING_REPOSITORY

tensorflow/training/docker/2.19/py3/Dockerfile.sagemaker.cpu.core_packages.json

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,7 @@
11
{
2+
"setuptools": {
3+
"version_specifier": ">=81.0.0"
4+
},
25
"awscli": {
36
"version_specifier": "<2"
47
},

tensorflow/training/docker/2.19/py3/Dockerfile.sagemaker.cpu.os_scan_allowlist.json

Lines changed: 0 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -549,37 +549,6 @@
549549
"reason_to_ignore": "N/A"
550550
}
551551
],
552-
"jaraco.context": [
553-
{
554-
"description": "jaraco.context, an open-source software package that provides some useful decorators and context managers, has a Zip Slip path traversal vulnerability in the `jaraco.context.tarball()` function starting in version 5.2.0 and prior to version 6.1.0. The vulnerability may allow attackers to extract files outside the intended extraction directory when malicious tar archives are processed. The strip_first_component filter splits the path on the first `/` and extracts the second component, while allowing `../` sequences. Paths like `dummy_dir/../../etc/passwd` become `../../etc/passwd`. Note that this suffers from a nested tarball attack as well with multi-level tar files such as `dummy_dir/inner.tar.gz`, where the inner.tar.gz includes a traversal `dummy_dir/../../config/.env` that also gets translated to `../../config/.env`. Version 6.1.0 contains a patch for the issue.",
555-
"vulnerability_id": "CVE-2026-23949",
556-
"name": "CVE-2026-23949",
557-
"package_name": "jaraco.context",
558-
"package_details": {
559-
"file_path": "/usr/local/lib/python3.12/site-packages/setuptools/_vendor/jaraco.context-5.3.0.dist-info/METADATA",
560-
"name": "jaraco.context",
561-
"package_manager": "PYTHON",
562-
"version": "5.3.0",
563-
"release": null
564-
},
565-
"remediation": {
566-
"recommendation": {
567-
"text": "None Provided"
568-
}
569-
},
570-
"cvss_v3_score": 8.6,
571-
"cvss_v30_score": 0.0,
572-
"cvss_v31_score": 8.6,
573-
"cvss_v2_score": 0.0,
574-
"cvss_v3_severity": "HIGH",
575-
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23949",
576-
"source": "NVD",
577-
"severity": "HIGH",
578-
"status": "ACTIVE",
579-
"title": "CVE-2026-23949 - jaraco.context",
580-
"reason_to_ignore": "N/A"
581-
}
582-
],
583552
"qs": [
584553
{
585554
"description": "Improper Input Validation vulnerability in qs (parse modules) allows HTTP DoS.This issue affects qs: < 6.14.1.\n\nSummaryThe arrayLimit\u00a0option in qs does not enforce limits for bracket notation (a[]=1&a[]=2), allowing attackers to cause denial-of-service via memory exhaustion. Applications using arrayLimit\u00a0for DoS protection are vulnerable.\n\nDetailsThe arrayLimit\u00a0option only checks limits for indexed notation (a[0]=1&a[1]=2) but completely bypasses it for bracket notation (a[]=1&a[]=2).\n\nVulnerable code\u00a0(lib/parse.js:159-162):\n\nif (root === '[]' && options.parseArrays) { obj = utils.combine([], leaf); // No arrayLimit check }\n\nWorking code\u00a0(lib/parse.js:175):\n\nelse if (index <= options.arrayLimit) { // Limit checked here obj = []; obj[index] = leaf; }\n\nThe bracket notation handler at line 159 uses utils.combine([], leaf)\u00a0without validating against options.arrayLimit, while indexed notation at line 175 checks index <= options.arrayLimit\u00a0before creating arrays.\n\nPoCTest 1 - Basic bypass:\n\nnpm install qs\n\nconst qs",

tensorflow/training/docker/2.19/py3/cu125/Dockerfile.sagemaker.gpu.core_packages.json

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,7 @@
11
{
2+
"setuptools": {
3+
"version_specifier": ">=81.0.0"
4+
},
25
"awscli": {
36
"version_specifier": "<2"
47
},

tensorflow/training/docker/2.19/py3/cu125/Dockerfile.sagemaker.gpu.os_scan_allowlist.json

Lines changed: 0 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -549,37 +549,6 @@
549549
"reason_to_ignore": "N/A"
550550
}
551551
],
552-
"jaraco.context": [
553-
{
554-
"description": "jaraco.context, an open-source software package that provides some useful decorators and context managers, has a Zip Slip path traversal vulnerability in the `jaraco.context.tarball()` function starting in version 5.2.0 and prior to version 6.1.0. The vulnerability may allow attackers to extract files outside the intended extraction directory when malicious tar archives are processed. The strip_first_component filter splits the path on the first `/` and extracts the second component, while allowing `../` sequences. Paths like `dummy_dir/../../etc/passwd` become `../../etc/passwd`. Note that this suffers from a nested tarball attack as well with multi-level tar files such as `dummy_dir/inner.tar.gz`, where the inner.tar.gz includes a traversal `dummy_dir/../../config/.env` that also gets translated to `../../config/.env`. Version 6.1.0 contains a patch for the issue.",
555-
"vulnerability_id": "CVE-2026-23949",
556-
"name": "CVE-2026-23949",
557-
"package_name": "jaraco.context",
558-
"package_details": {
559-
"file_path": "/usr/local/lib/python3.12/site-packages/setuptools/_vendor/jaraco.context-5.3.0.dist-info/METADATA",
560-
"name": "jaraco.context",
561-
"package_manager": "PYTHON",
562-
"version": "5.3.0",
563-
"release": null
564-
},
565-
"remediation": {
566-
"recommendation": {
567-
"text": "None Provided"
568-
}
569-
},
570-
"cvss_v3_score": 8.6,
571-
"cvss_v30_score": 0.0,
572-
"cvss_v31_score": 8.6,
573-
"cvss_v2_score": 0.0,
574-
"cvss_v3_severity": "HIGH",
575-
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23949",
576-
"source": "NVD",
577-
"severity": "HIGH",
578-
"status": "ACTIVE",
579-
"title": "CVE-2026-23949 - jaraco.context",
580-
"reason_to_ignore": "N/A"
581-
}
582-
],
583552
"qs": [
584553
{
585554
"description": "Improper Input Validation vulnerability in qs (parse modules) allows HTTP DoS.This issue affects qs: < 6.14.1.\n\nSummaryThe arrayLimit\u00a0option in qs does not enforce limits for bracket notation (a[]=1&a[]=2), allowing attackers to cause denial-of-service via memory exhaustion. Applications using arrayLimit\u00a0for DoS protection are vulnerable.\n\nDetailsThe arrayLimit\u00a0option only checks limits for indexed notation (a[0]=1&a[1]=2) but completely bypasses it for bracket notation (a[]=1&a[]=2).\n\nVulnerable code\u00a0(lib/parse.js:159-162):\n\nif (root === '[]' && options.parseArrays) { obj = utils.combine([], leaf); // No arrayLimit check }\n\nWorking code\u00a0(lib/parse.js:175):\n\nelse if (index <= options.arrayLimit) { // Limit checked here obj = []; obj[index] = leaf; }\n\nThe bracket notation handler at line 159 uses utils.combine([], leaf)\u00a0without validating against options.arrayLimit, while indexed notation at line 175 checks index <= options.arrayLimit\u00a0before creating arrays.\n\nPoCTest 1 - Basic bypass:\n\nnpm install qs\n\nconst qs",

0 commit comments

Comments
 (0)