Skip to content

Commit 7401152

Browse files
Merge branch 'master' into add_nixl
2 parents c97ea88 + e76f361 commit 7401152

File tree

4 files changed

+33
-33
lines changed

4 files changed

+33
-33
lines changed

tensorflow/training/docker/2.18/py3/Dockerfile.cpu

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -271,7 +271,7 @@ RUN $PYTHON -m pip install --no-cache-dir -U \
271271
plotly \
272272
seaborn \
273273
shap \
274-
numpy
274+
"numpy<2"
275275

276276
RUN $PYTHON -m pip install --no-cache-dir -U \
277277
"sagemaker<3"

tensorflow/training/docker/2.18/py3/cu125/Dockerfile.ec2.gpu.os_scan_allowlist.json

Lines changed: 0 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -2518,36 +2518,5 @@
25182518
"title": "CVE-2025-4565 - protobuf",
25192519
"reason_to_ignore": "protobuf upgrade is not possible at the moment - this version has dependency with tensorflow metadata "
25202520
}
2521-
],
2522-
"fast-redact": [
2523-
{
2524-
"description": "fast-redact is a package that provides do very fast object redaction. A Prototype Pollution vulnerability in the nestedRestore function of fast-redact version 3.5.0 and before allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence. NOTE: the Supplier disputes this because the reporter only demonstrated access to properties by an internal utility function, and there is no means for achieving prototype pollution via the public API.",
2525-
"vulnerability_id": "CVE-2025-57319",
2526-
"name": "CVE-2025-57319",
2527-
"package_name": "fast-redact",
2528-
"package_details": {
2529-
"file_path": "/usr/local/lib/python3.10/site-packages/jupyterlab/staging/yarn.lock",
2530-
"name": "fast-redact",
2531-
"package_manager": "NODE",
2532-
"version": "3.5.0",
2533-
"release": null
2534-
},
2535-
"remediation": {
2536-
"recommendation": {
2537-
"text": "None Provided"
2538-
}
2539-
},
2540-
"cvss_v3_score": 7.5,
2541-
"cvss_v30_score": 0,
2542-
"cvss_v31_score": 7.5,
2543-
"cvss_v2_score": 0,
2544-
"cvss_v3_severity": "HIGH",
2545-
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-57319",
2546-
"source": "NVD",
2547-
"severity": "HIGH",
2548-
"status": "ACTIVE",
2549-
"title": "CVE-2025-57319 - fast-redact",
2550-
"reason_to_ignore": "N/A"
2551-
}
25522521
]
25532522
}

tensorflow/training/docker/2.18/py3/cu125/Dockerfile.gpu

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -374,7 +374,7 @@ RUN $PYTHON -m pip install --no-cache-dir -U \
374374
plotly \
375375
seaborn \
376376
shap \
377-
numpy
377+
"numpy<2"
378378

379379
RUN $PYTHON -m pip install --no-cache-dir -U \
380380
"sagemaker<3"

tensorflow/training/docker/2.18/py3/cu125/Dockerfile.sagemaker.gpu.os_scan_allowlist.json

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3459,5 +3459,36 @@
34593459
"title": "CVE-2025-7783 - form-data",
34603460
"reason_to_ignore": "N/A"
34613461
}
3462+
],
3463+
"fast-redact": [
3464+
{
3465+
"description": "fast-redact is a package that provides do very fast object redaction. A Prototype Pollution vulnerability in the nestedRestore function of fast-redact version 3.5.0 and before allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence. NOTE: the Supplier disputes this because the reporter only demonstrated access to properties by an internal utility function, and there is no means for achieving prototype pollution via the public API.",
3466+
"vulnerability_id": "CVE-2025-57319",
3467+
"name": "CVE-2025-57319",
3468+
"package_name": "fast-redact",
3469+
"package_details": {
3470+
"file_path": "/usr/local/lib/python3.10/site-packages/jupyterlab/staging/yarn.lock",
3471+
"name": "fast-redact",
3472+
"package_manager": "NODE",
3473+
"version": "3.5.0",
3474+
"release": null
3475+
},
3476+
"remediation": {
3477+
"recommendation": {
3478+
"text": "None Provided"
3479+
}
3480+
},
3481+
"cvss_v3_score": 7.5,
3482+
"cvss_v30_score": 0,
3483+
"cvss_v31_score": 7.5,
3484+
"cvss_v2_score": 0,
3485+
"cvss_v3_severity": "HIGH",
3486+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-57319",
3487+
"source": "NVD",
3488+
"severity": "HIGH",
3489+
"status": "ACTIVE",
3490+
"title": "CVE-2025-57319 - fast-redact",
3491+
"reason_to_ignore": "N/A"
3492+
}
34623493
]
34633494
}

0 commit comments

Comments
 (0)