Skip to content

Commit 576b439

Browse files
Yadan-WeiYadan Wei
andauthored
add libxml2 to allowlist which is already the latest version (#4764)
Co-authored-by: Yadan Wei <[email protected]>
1 parent 7191c95 commit 576b439

File tree

2 files changed

+104
-0
lines changed

2 files changed

+104
-0
lines changed

pytorch/training/docker/2.5/py3/Dockerfile.sagemaker.cpu.os_scan_allowlist.json

Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -250,5 +250,57 @@
250250
"title": "CVE-2024-37059 - mlflow",
251251
"reason_to_ignore": "N/A"
252252
}
253+
],
254+
"libxml2": [
255+
{
256+
"description": "In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.",
257+
"vulnerability_id": "CVE-2025-32415",
258+
"name": "CVE-2025-32415",
259+
"package_name": "libxml2",
260+
"package_details": {
261+
"file_path": null,
262+
"name": "libxml2",
263+
"package_manager": "OS",
264+
"version": "2.9.13+dfsg",
265+
"release": "1ubuntu0.6"
266+
},
267+
"remediation": { "recommendation": { "text": "None Provided" } },
268+
"cvss_v3_score": 7.5,
269+
"cvss_v30_score": 0.0,
270+
"cvss_v31_score": 7.5,
271+
"cvss_v2_score": 0.0,
272+
"cvss_v3_severity": "HIGH",
273+
"source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-32415.html",
274+
"source": "UBUNTU_CVE",
275+
"severity": "HIGH",
276+
"status": "ACTIVE",
277+
"title": "CVE-2025-32415 - libxml2",
278+
"reason_to_ignore": "N/A"
279+
},
280+
{
281+
"description": "In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect return value. This occurs in xmlPythonFileRead and xmlPythonFileReadRaw because of a difference between bytes and characters.",
282+
"vulnerability_id": "CVE-2025-32414",
283+
"name": "CVE-2025-32414",
284+
"package_name": "libxml2",
285+
"package_details": {
286+
"file_path": null,
287+
"name": "libxml2",
288+
"package_manager": "OS",
289+
"version": "2.9.13+dfsg",
290+
"release": "1ubuntu0.6"
291+
},
292+
"remediation": { "recommendation": { "text": "None Provided" } },
293+
"cvss_v3_score": 7.5,
294+
"cvss_v30_score": 0.0,
295+
"cvss_v31_score": 7.5,
296+
"cvss_v2_score": 0.0,
297+
"cvss_v3_severity": "HIGH",
298+
"source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-32414.html",
299+
"source": "UBUNTU_CVE",
300+
"severity": "HIGH",
301+
"status": "ACTIVE",
302+
"title": "CVE-2025-32414 - libxml2",
303+
"reason_to_ignore": "N/A"
304+
}
253305
]
254306
}

pytorch/training/docker/2.5/py3/cu124/Dockerfile.sagemaker.gpu.os_scan_allowlist.json

Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1139,5 +1139,57 @@
11391139
"title": "CVE-2024-45337 - golang.org/x/crypto",
11401140
"reason_to_ignore": "N/A"
11411141
}
1142+
],
1143+
"libxml2": [
1144+
{
1145+
"description": "In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.",
1146+
"vulnerability_id": "CVE-2025-32415",
1147+
"name": "CVE-2025-32415",
1148+
"package_name": "libxml2",
1149+
"package_details": {
1150+
"file_path": null,
1151+
"name": "libxml2",
1152+
"package_manager": "OS",
1153+
"version": "2.9.13+dfsg",
1154+
"release": "1ubuntu0.6"
1155+
},
1156+
"remediation": { "recommendation": { "text": "None Provided" } },
1157+
"cvss_v3_score": 7.5,
1158+
"cvss_v30_score": 0.0,
1159+
"cvss_v31_score": 7.5,
1160+
"cvss_v2_score": 0.0,
1161+
"cvss_v3_severity": "HIGH",
1162+
"source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-32415.html",
1163+
"source": "UBUNTU_CVE",
1164+
"severity": "HIGH",
1165+
"status": "ACTIVE",
1166+
"title": "CVE-2025-32415 - libxml2",
1167+
"reason_to_ignore": "N/A"
1168+
},
1169+
{
1170+
"description": "In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect return value. This occurs in xmlPythonFileRead and xmlPythonFileReadRaw because of a difference between bytes and characters.",
1171+
"vulnerability_id": "CVE-2025-32414",
1172+
"name": "CVE-2025-32414",
1173+
"package_name": "libxml2",
1174+
"package_details": {
1175+
"file_path": null,
1176+
"name": "libxml2",
1177+
"package_manager": "OS",
1178+
"version": "2.9.13+dfsg",
1179+
"release": "1ubuntu0.6"
1180+
},
1181+
"remediation": { "recommendation": { "text": "None Provided" } },
1182+
"cvss_v3_score": 7.5,
1183+
"cvss_v30_score": 0.0,
1184+
"cvss_v31_score": 7.5,
1185+
"cvss_v2_score": 0.0,
1186+
"cvss_v3_severity": "HIGH",
1187+
"source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-32414.html",
1188+
"source": "UBUNTU_CVE",
1189+
"severity": "HIGH",
1190+
"status": "ACTIVE",
1191+
"title": "CVE-2025-32414 - libxml2",
1192+
"reason_to_ignore": "N/A"
1193+
}
11421194
]
11431195
}

0 commit comments

Comments
 (0)