Skip to content

Commit 923f331

Browse files
authored
[Patch] Tensorflow 2.19 sagemaker image build (#5511)
* Tensorflow 2.19 sagemaker image build
1 parent e70aa87 commit 923f331

File tree

5 files changed

+432
-3
lines changed

5 files changed

+432
-3
lines changed

tensorflow/training/buildspec-2-19-sm.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ framework: &FRAMEWORK tensorflow
55
version: &VERSION 2.19.0
66
short_version: &SHORT_VERSION "2.19"
77
arch_type: x86
8-
# autopatch_build: "True"
8+
autopatch_build: "True"
99

1010
repository_info:
1111
training_repository: &TRAINING_REPOSITORY

tensorflow/training/docker/2.19/py3/Dockerfile.sagemaker.cpu.os_scan_allowlist.json

Lines changed: 213 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -273,5 +273,218 @@
273273
"title": "CVE-2025-57319 - fast-redact",
274274
"reason_to_ignore": "N/A"
275275
}
276+
],
277+
"curl/libcurl": [
278+
{
279+
"description": "When libcurl is asked to perform automatic gzip decompression of content-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option, **using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would make libcurl perform a buffer overflow.",
280+
"vulnerability_id": "CVE-2025-0725",
281+
"name": "CVE-2025-0725",
282+
"package_name": "curl/libcurl",
283+
"package_details": {
284+
"file_path": "/usr/local/lib/python3.12/site-packages/tensorflow/include/external/curl/include/curl/curlver.h",
285+
"name": "curl/libcurl",
286+
"package_manager": "GENERIC",
287+
"version": "8.11.0",
288+
"release": null
289+
},
290+
"remediation": {
291+
"recommendation": {
292+
"text": "None Provided"
293+
}
294+
},
295+
"cvss_v3_score": 7.3,
296+
"cvss_v30_score": 0.0,
297+
"cvss_v31_score": 7.3,
298+
"cvss_v2_score": 0.0,
299+
"cvss_v3_severity": "HIGH",
300+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0725",
301+
"source": "NVD",
302+
"severity": "HIGH",
303+
"status": "ACTIVE",
304+
"title": "CVE-2025-0725 - curl/libcurl",
305+
"reason_to_ignore": "N/A"
306+
},
307+
{
308+
"description": "1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path='/'`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic makes curl read outside a heap buffer boundary\n\nThe bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path.\n\nThe presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.",
309+
"vulnerability_id": "CVE-2025-9086",
310+
"name": "CVE-2025-9086",
311+
"package_name": "curl/libcurl",
312+
"package_details": {
313+
"file_path": "/usr/local/lib/python3.12/site-packages/tensorflow/include/external/curl/include/curl/curlver.h",
314+
"name": "curl/libcurl",
315+
"package_manager": "GENERIC",
316+
"version": "8.11.0",
317+
"release": null
318+
},
319+
"remediation": {
320+
"recommendation": {
321+
"text": "None Provided"
322+
}
323+
},
324+
"cvss_v3_score": 7.5,
325+
"cvss_v30_score": 0.0,
326+
"cvss_v31_score": 7.5,
327+
"cvss_v2_score": 0.0,
328+
"cvss_v3_severity": "HIGH",
329+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9086",
330+
"source": "NVD",
331+
"severity": "HIGH",
332+
"status": "ACTIVE",
333+
"title": "CVE-2025-9086 - curl/libcurl",
334+
"reason_to_ignore": "N/A"
335+
}
336+
],
337+
"glob": [
338+
{
339+
"description": "Glob matches files using patterns the shell uses. Starting in version 10.2.0 and prior to versions 10.5.0 and 11.1.0, the glob CLI contains a command injection vulnerability in its -c/--cmd option that allows arbitrary command execution when processing files with malicious names. When glob -c <command> <patterns> are used, matched filenames are passed to a shell with shell: true, enabling shell metacharacters in filenames to trigger command injection and achieve arbitrary code execution under the user or CI account privileges. This issue has been patched in versions 10.5.0 and 11.1.0.",
340+
"vulnerability_id": "CVE-2025-64756",
341+
"name": "CVE-2025-64756",
342+
"package_name": "glob",
343+
"package_details": {
344+
"file_path": "/usr/local/lib/python3.12/site-packages/jupyterlab/staging/yarn.lock",
345+
"name": "glob",
346+
"package_manager": "NODE",
347+
"version": "10.3.10",
348+
"release": null
349+
},
350+
"remediation": {
351+
"recommendation": {
352+
"text": "None Provided"
353+
}
354+
},
355+
"cvss_v3_score": 7.5,
356+
"cvss_v30_score": 0.0,
357+
"cvss_v31_score": 7.5,
358+
"cvss_v2_score": 0.0,
359+
"cvss_v3_severity": "HIGH",
360+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64756",
361+
"source": "NVD",
362+
"severity": "HIGH",
363+
"status": "ACTIVE",
364+
"title": "CVE-2025-64756 - glob",
365+
"reason_to_ignore": "N/A"
366+
}
367+
],
368+
"vega": [
369+
{
370+
"description": "Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. In Vega prior to version 6.2.0, applications meeting 2 conditions are at risk of arbitrary JavaScript code execution, even if \"safe mode\" expressionInterpreter is used. They are vulnerable if they use `vega` in an application that attaches `vega` library and a `vega.View` instance similar to the Vega Editor to the global `window` and if they allow user-defined Vega `JSON` definitions (vs JSON that was is only provided through source code). Patches are available in the following Vega applications. If using the latest Vega line (6.x), upgrade to `vega` `6.2.0` / `vega-expression` `6.1.0` / `vega-interpreter` `2.2.1` (if using AST evaluator mode). If using Vega in a non-ESM environment, upgrade to `vega-expression` `5.2.1` / `1.2.1` (if using AST evaluator mode). Some workarounds are available. Do not attach `vega` View instances to global variables, and do not attach `vega` to the global wi",
371+
"vulnerability_id": "CVE-2025-59840",
372+
"name": "CVE-2025-59840",
373+
"package_name": "vega",
374+
"package_details": {
375+
"file_path": "/usr/local/lib/python3.12/site-packages/jupyterlab/staging/yarn.lock",
376+
"name": "vega",
377+
"package_manager": "NODE",
378+
"version": "5.33.0",
379+
"release": null
380+
},
381+
"remediation": {
382+
"recommendation": {
383+
"text": "None Provided"
384+
}
385+
},
386+
"cvss_v3_score": 8.1,
387+
"cvss_v30_score": 0.0,
388+
"cvss_v31_score": 8.1,
389+
"cvss_v2_score": 0.0,
390+
"cvss_v3_severity": "HIGH",
391+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59840",
392+
"source": "NVD",
393+
"severity": "HIGH",
394+
"status": "ACTIVE",
395+
"title": "CVE-2025-59840 - vega, vega-expression and 2 more",
396+
"reason_to_ignore": "N/A"
397+
}
398+
],
399+
"vega-expression": [
400+
{
401+
"description": "Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. In Vega prior to version 6.2.0, applications meeting 2 conditions are at risk of arbitrary JavaScript code execution, even if \"safe mode\" expressionInterpreter is used. They are vulnerable if they use `vega` in an application that attaches `vega` library and a `vega.View` instance similar to the Vega Editor to the global `window` and if they allow user-defined Vega `JSON` definitions (vs JSON that was is only provided through source code). Patches are available in the following Vega applications. If using the latest Vega line (6.x), upgrade to `vega` `6.2.0` / `vega-expression` `6.1.0` / `vega-interpreter` `2.2.1` (if using AST evaluator mode). If using Vega in a non-ESM environment, upgrade to `vega-expression` `5.2.1` / `1.2.1` (if using AST evaluator mode). Some workarounds are available. Do not attach `vega` View instances to global variables, and do not attach `vega` to the global wi",
402+
"vulnerability_id": "CVE-2025-59840",
403+
"name": "CVE-2025-59840",
404+
"package_name": "vega-expression",
405+
"package_details": {
406+
"file_path": "/usr/local/lib/python3.12/site-packages/jupyterlab/staging/yarn.lock",
407+
"name": "vega-expression",
408+
"package_manager": "NODE",
409+
"version": "5.0.1",
410+
"release": null
411+
},
412+
"remediation": {
413+
"recommendation": {
414+
"text": "None Provided"
415+
}
416+
},
417+
"cvss_v3_score": 8.1,
418+
"cvss_v30_score": 0.0,
419+
"cvss_v31_score": 8.1,
420+
"cvss_v2_score": 0.0,
421+
"cvss_v3_severity": "HIGH",
422+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59840",
423+
"source": "NVD",
424+
"severity": "HIGH",
425+
"status": "ACTIVE",
426+
"title": "CVE-2025-59840 - vega, vega-expression and 2 more",
427+
"reason_to_ignore": "N/A"
428+
},
429+
{
430+
"description": "Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. In Vega prior to version 6.2.0, applications meeting 2 conditions are at risk of arbitrary JavaScript code execution, even if \"safe mode\" expressionInterpreter is used. They are vulnerable if they use `vega` in an application that attaches `vega` library and a `vega.View` instance similar to the Vega Editor to the global `window` and if they allow user-defined Vega `JSON` definitions (vs JSON that was is only provided through source code). Patches are available in the following Vega applications. If using the latest Vega line (6.x), upgrade to `vega` `6.2.0` / `vega-expression` `6.1.0` / `vega-interpreter` `2.2.1` (if using AST evaluator mode). If using Vega in a non-ESM environment, upgrade to `vega-expression` `5.2.1` / `1.2.1` (if using AST evaluator mode). Some workarounds are available. Do not attach `vega` View instances to global variables, and do not attach `vega` to the global wi",
431+
"vulnerability_id": "CVE-2025-59840",
432+
"name": "CVE-2025-59840",
433+
"package_name": "vega-expression",
434+
"package_details": {
435+
"file_path": "/usr/local/lib/python3.12/site-packages/jupyterlab/staging/yarn.lock",
436+
"name": "vega-expression",
437+
"package_manager": "NODE",
438+
"version": "5.2.0",
439+
"release": null
440+
},
441+
"remediation": {
442+
"recommendation": {
443+
"text": "None Provided"
444+
}
445+
},
446+
"cvss_v3_score": 8.1,
447+
"cvss_v30_score": 0.0,
448+
"cvss_v31_score": 8.1,
449+
"cvss_v2_score": 0.0,
450+
"cvss_v3_severity": "HIGH",
451+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59840",
452+
"source": "NVD",
453+
"severity": "HIGH",
454+
"status": "ACTIVE",
455+
"title": "CVE-2025-59840 - vega, vega-expression and 2 more",
456+
"reason_to_ignore": "N/A"
457+
}
458+
],
459+
"vega-interpreter": [
460+
{
461+
"description": "Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. In Vega prior to version 6.2.0, applications meeting 2 conditions are at risk of arbitrary JavaScript code execution, even if \"safe mode\" expressionInterpreter is used. They are vulnerable if they use `vega` in an application that attaches `vega` library and a `vega.View` instance similar to the Vega Editor to the global `window` and if they allow user-defined Vega `JSON` definitions (vs JSON that was is only provided through source code). Patches are available in the following Vega applications. If using the latest Vega line (6.x), upgrade to `vega` `6.2.0` / `vega-expression` `6.1.0` / `vega-interpreter` `2.2.1` (if using AST evaluator mode). If using Vega in a non-ESM environment, upgrade to `vega-expression` `5.2.1` / `1.2.1` (if using AST evaluator mode). Some workarounds are available. Do not attach `vega` View instances to global variables, and do not attach `vega` to the global wi",
462+
"vulnerability_id": "CVE-2025-59840",
463+
"name": "CVE-2025-59840",
464+
"package_name": "vega-interpreter",
465+
"package_details": {
466+
"file_path": "/usr/local/lib/python3.12/site-packages/jupyterlab/staging/yarn.lock",
467+
"name": "vega-interpreter",
468+
"package_manager": "NODE",
469+
"version": "1.0.5",
470+
"release": null
471+
},
472+
"remediation": {
473+
"recommendation": {
474+
"text": "None Provided"
475+
}
476+
},
477+
"cvss_v3_score": 8.1,
478+
"cvss_v30_score": 0.0,
479+
"cvss_v31_score": 8.1,
480+
"cvss_v2_score": 0.0,
481+
"cvss_v3_severity": "HIGH",
482+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59840",
483+
"source": "NVD",
484+
"severity": "HIGH",
485+
"status": "ACTIVE",
486+
"title": "CVE-2025-59840 - vega, vega-expression and 2 more",
487+
"reason_to_ignore": "N/A"
488+
}
276489
]
277490
}

tensorflow/training/docker/2.19/py3/cu125/Dockerfile.gpu

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -330,6 +330,9 @@ RUN pip install --no-cache-dir -U \
330330
--no-build-isolation
331331

332332

333+
# Pin numpy to 1.26.4
334+
RUN ${PIP} install --no-cache-dir -U "numpy==1.26.4"
335+
333336
# https://github.com/tensorflow/models/issues/9267
334337
# tf-models does not respect existing installations of TF and always installs open source TF
335338
RUN ${PIP} install \

0 commit comments

Comments
 (0)