Skip to content

Commit 638c3cf

Browse files
authored
Merge branch 'master' into basecu128
2 parents aab5d4c + 28231cf commit 638c3cf

File tree

4 files changed

+82
-1
lines changed

4 files changed

+82
-1
lines changed

release_images_general.yml

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,20 @@ release_images:
1515
force_release: False
1616
public_registry: True
1717
2:
18+
framework: "base"
19+
version: "12.9.1"
20+
arch_type: "x86"
21+
customer_type: "ec2"
22+
general:
23+
device_types: [ "gpu" ]
24+
python_versions: [ "py312" ]
25+
os_version: "ubuntu22.04"
26+
cuda_version: "cu129"
27+
example: False
28+
disable_sm_tag: False
29+
force_release: False
30+
public_registry: True
31+
3:
1832
framework: "vllm"
1933
version: "0.10.0"
2034
arch_type: "x86"

release_images_inference.yml

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -235,4 +235,17 @@ release_images:
235235
cuda_version: "cu126"
236236
example: False
237237
disable_sm_tag: True
238-
force_release: False
238+
force_release: False
239+
19:
240+
framework: "djl"
241+
version: "0.0.0.dev1"
242+
arch_type: "x86"
243+
inference:
244+
device_types: [ "gpu" ]
245+
python_versions: [ "py311" ]
246+
os_version: "ubuntu22.04"
247+
lmi_version: "0.0.0.dev1"
248+
cuda_version: "cu128"
249+
example: False
250+
disable_sm_tag: True
251+
force_release: False

tensorflow/training/docker/2.19/py3/Dockerfile.sagemaker.cpu.os_scan_allowlist.json

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -129,5 +129,32 @@
129129
"title": "CVE-2024-37890 - ws, ws",
130130
"reason_to_ignore": "N/A"
131131
}
132+
],
133+
"keras": [
134+
{
135+
"description": "A safe mode bypass vulnerability in the `Model.load_model` method in Keras versions 3.0.0 through 3.10.0 allows an attacker to achieve arbitrary code execution by convincing a user to load a specially crafted `.keras` model archive.",
136+
"vulnerability_id": "CVE-2025-8747",
137+
"name": "CVE-2025-8747",
138+
"package_name": "keras",
139+
"package_details": {
140+
"file_path": "/usr/local/lib/python3.12/site-packages/keras-3.10.0.dist-info/METADATA",
141+
"name": "keras",
142+
"package_manager": "PYTHON",
143+
"version": "3.10.0",
144+
"release": null
145+
},
146+
"remediation": { "recommendation": { "text": "None Provided" } },
147+
"cvss_v3_score": 7.8,
148+
"cvss_v30_score": 0.0,
149+
"cvss_v31_score": 7.8,
150+
"cvss_v2_score": 0.0,
151+
"cvss_v3_severity": "HIGH",
152+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8747",
153+
"source": "NVD",
154+
"severity": "HIGH",
155+
"status": "ACTIVE",
156+
"title": "CVE-2025-8747 - keras",
157+
"reason_to_ignore": "N/A"
158+
}
132159
]
133160
}

tensorflow/training/docker/2.19/py3/cu125/Dockerfile.sagemaker.gpu.os_scan_allowlist.json

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -129,5 +129,32 @@
129129
"title": "CVE-2024-37890 - ws, ws",
130130
"reason_to_ignore": "N/A"
131131
}
132+
],
133+
"keras": [
134+
{
135+
"description": "A safe mode bypass vulnerability in the `Model.load_model` method in Keras versions 3.0.0 through 3.10.0 allows an attacker to achieve arbitrary code execution by convincing a user to load a specially crafted `.keras` model archive.",
136+
"vulnerability_id": "CVE-2025-8747",
137+
"name": "CVE-2025-8747",
138+
"package_name": "keras",
139+
"package_details": {
140+
"file_path": "/usr/local/lib/python3.12/site-packages/keras-3.10.0.dist-info/METADATA",
141+
"name": "keras",
142+
"package_manager": "PYTHON",
143+
"version": "3.10.0",
144+
"release": null
145+
},
146+
"remediation": { "recommendation": { "text": "None Provided" } },
147+
"cvss_v3_score": 7.8,
148+
"cvss_v30_score": 0.0,
149+
"cvss_v31_score": 7.8,
150+
"cvss_v2_score": 0.0,
151+
"cvss_v3_severity": "HIGH",
152+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8747",
153+
"source": "NVD",
154+
"severity": "HIGH",
155+
"status": "ACTIVE",
156+
"title": "CVE-2025-8747 - keras",
157+
"reason_to_ignore": "N/A"
158+
}
132159
]
133160
}

0 commit comments

Comments
 (0)