Skip to content

Commit 5447ad0

Browse files
committed
add allowlist
1 parent de0b8e2 commit 5447ad0

File tree

2 files changed

+61
-3
lines changed

2 files changed

+61
-3
lines changed

pytorch/training/docker/2.4/py3/Dockerfile.ec2.cpu.os_scan_allowlist.json

Lines changed: 31 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@
2727
"severity": "CRITICAL",
2828
"status": "ACTIVE",
2929
"title": "CVE-2025-32434 - torch",
30-
"reason_to_ignore": "this container is specifically pytorch 2.5.x so we can’t upgrade to 2.6"
30+
"reason_to_ignore": "this container is specifically pytorch 2.4.x so we cant upgrade to later minor versions"
3131
},
3232
{
3333
"description": "PyTorch is a Python package that provides tensor computation with strong GPU acceleration and deep neural networks built on a tape-based autograd system. In version 2.5.1 and prior, a Remote Command Execution (RCE) vulnerability exists in PyTorch when loading a model using torch.load with weights_only=True. This issue has been patched in version 2.6.0.",
@@ -57,7 +57,36 @@
5757
"status": "ACTIVE",
5858
"title": "CVE-2025-32434 - torch",
5959
"reason_to_ignore": "N/A"
60-
}
60+
},
61+
{
62+
"description": "In PyTorch <=2.4.1, the RemoteModule has Deserialization RCE. NOTE: this is disputed by multiple parties because this is intended behavior in PyTorch distributed computing.",
63+
"vulnerability_id": "CVE-2024-48063",
64+
"name": "CVE-2024-48063",
65+
"package_name": "torch",
66+
"package_details": {
67+
"file_path": "/opt/conda/lib/python3.11/site-packages/torch-2.4.0+cu124.dist-info/METADATA",
68+
"name": "torch",
69+
"package_manager": "PYTHON",
70+
"version": "2.4.0+cu124",
71+
"release": null
72+
},
73+
"remediation": {
74+
"recommendation": {
75+
"text": "None Provided"
76+
}
77+
},
78+
"cvss_v3_score": 9.8,
79+
"cvss_v30_score": 0.0,
80+
"cvss_v31_score": 9.8,
81+
"cvss_v2_score": 0.0,
82+
"cvss_v3_severity": "CRITICAL",
83+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-48063",
84+
"source": "NVD",
85+
"severity": "CRITICAL",
86+
"status": "ACTIVE",
87+
"title": "CVE-2024-48063 - torch",
88+
"reason_to_ignore": "this container is specifically pytorch 2.4.x so we cant upgrade to later minor versions"
89+
},
6190
],
6291
"jupyter_core": [
6392
{

pytorch/training/docker/2.4/py3/cu124/Dockerfile.ec2.gpu.os_scan_allowlist.json

Lines changed: 30 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -906,7 +906,36 @@
906906
"status": "ACTIVE",
907907
"title": "CVE-2025-32434 - torch",
908908
"reason_to_ignore": "N/A"
909-
}
909+
},
910+
{
911+
"description": "In PyTorch <=2.4.1, the RemoteModule has Deserialization RCE. NOTE: this is disputed by multiple parties because this is intended behavior in PyTorch distributed computing.",
912+
"vulnerability_id": "CVE-2024-48063",
913+
"name": "CVE-2024-48063",
914+
"package_name": "torch",
915+
"package_details": {
916+
"file_path": "/opt/conda/lib/python3.11/site-packages/torch-2.4.0+cu124.dist-info/METADATA",
917+
"name": "torch",
918+
"package_manager": "PYTHON",
919+
"version": "2.4.0+cu124",
920+
"release": null
921+
},
922+
"remediation": {
923+
"recommendation": {
924+
"text": "None Provided"
925+
}
926+
},
927+
"cvss_v3_score": 9.8,
928+
"cvss_v30_score": 0.0,
929+
"cvss_v31_score": 9.8,
930+
"cvss_v2_score": 0.0,
931+
"cvss_v3_severity": "CRITICAL",
932+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-48063",
933+
"source": "NVD",
934+
"severity": "CRITICAL",
935+
"status": "ACTIVE",
936+
"title": "CVE-2024-48063 - torch",
937+
"reason_to_ignore": "this container is specifically pytorch 2.4.x so we cant upgrade to later minor versions"
938+
},
910939
],
911940
"jupyter_core": [
912941
{

0 commit comments

Comments
 (0)