Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
49 commits
Select commit Hold shift + click to select a range
282f49c
test python upgrade
Jyothirmaikottu Sep 23, 2025
596f0dd
downgrade invoke
Jyothirmaikottu Sep 23, 2025
d27792f
pin version
Jyothirmaikottu Sep 23, 2025
06f4ab3
upgrade docker to newest version
Jyothirmaikottu Sep 23, 2025
94bf539
build pytorch 2.8 image with upgraded python
Jyothirmaikottu Sep 23, 2025
9c9c62a
arm64 python upgrade test
Jyothirmaikottu Sep 23, 2025
c8ed050
test autopatch x86
Jyothirmaikottu Sep 24, 2025
d73cbbe
tensorflow 2.19 rc error with new image
Jyothirmaikottu Sep 24, 2025
7df0518
inference tf 2.19 sm - python upgrade
Jyothirmaikottu Sep 24, 2025
3d6e032
test pytorch arm64 2.5 sm inference
Jyothirmaikottu Sep 24, 2025
526c1f4
test pytorch arm64 2.6 sm inference
Jyothirmaikottu Sep 24, 2025
803dbac
correct python command
Jyothirmaikottu Sep 24, 2025
bbbed99
add invoke back
Jyothirmaikottu Sep 25, 2025
255ffab
test sm local
Jyothirmaikottu Sep 25, 2025
c22454b
tensorflow arm64 2.19 inference
Jyothirmaikottu Sep 25, 2025
c099ca0
test tf 2.19 sm training build
Jyothirmaikottu Sep 25, 2025
c1c8940
test tf 2.19 sm arm64 inference build
Jyothirmaikottu Sep 25, 2025
28ccfb1
test tf 2.19 sm x86 training build
Jyothirmaikottu Sep 25, 2025
4f22abd
add lexicon and six?
Jyothirmaikottu Sep 25, 2025
ced2664
build tf 2.18
Jyothirmaikottu Sep 25, 2025
7d7a983
remove six and lexicon
Jyothirmaikottu Sep 29, 2025
9112890
test tf 2.18 sm
Jyothirmaikottu Sep 29, 2025
cd72de5
add uv changes
Jyothirmaikottu Sep 29, 2025
5c650db
rebuild with uv
Jyothirmaikottu Sep 29, 2025
0e85efc
install tf-datasets again with uv
Jyothirmaikottu Sep 29, 2025
a5ceb18
test pytorch with uv
Jyothirmaikottu Sep 29, 2025
1843628
test pytorch without uv in docker image
Jyothirmaikottu Sep 29, 2025
9b42768
remove uv changes
Jyothirmaikottu Sep 29, 2025
20ee49e
update neuron available images (#5281)
ahsan-z-khan Sep 18, 2025
71df1f1
patch: linux-libc-dev vulnerability in huggingface-pytorch-training-n…
j-w-l Sep 18, 2025
8b0366e
Release yaml changes - vLLM (#5282)
Jyothirmaikottu Sep 18, 2025
bb78f9b
Update Changelog vLLM (#5286)
Jyothirmaikottu Sep 19, 2025
14cde70
Add Neuronx SDK 2.26.0 images to release_images.md (#5287)
mounchin Sep 19, 2025
8ce0f88
Rebuild pytorch sm arm64 2.6 and pytorch sm arm64 2.5 image (#5261)
Jyothirmaikottu Sep 22, 2025
6d3a49b
Patch tf2.18 SM image (#5299)
Jyothirmaikottu Sep 25, 2025
e191f29
patch pytorch 2.5 inference ARM64 sagemaker image (#5298)
jinyan-li1 Sep 26, 2025
b13baec
PT 2.5 SM ARM - Comment out latest_release_tag in buildspec (#5305)
jinyan-li1 Sep 26, 2025
7984ec5
Patch TF2.18 inference arm64 (#5306)
Jyothirmaikottu Sep 26, 2025
9985c1e
Patch tensoflow 2.19 inference and training images (#5304)
jinyan-li1 Sep 26, 2025
8379493
Allowlisting dpkg as it is not patchable (#5308)
zhuofuAMZ Sep 26, 2025
bfcde1a
add more cves (#5309)
Jyothirmaikottu Sep 26, 2025
616dfdc
build tf 2.18
Jyothirmaikottu Sep 25, 2025
a32cbbb
remove uv changes
Jyothirmaikottu Sep 29, 2025
1f42068
fix delimiter (#5311)
Jyothirmaikottu Sep 29, 2025
ff34182
[djl-serving] Add 0.34.0 lmi image release (#5315)
ethnzhng Sep 29, 2025
ea6f42f
change codeowners (#5316)
sirutBuasai Sep 29, 2025
2ca7248
fix: update neuronx huggingface tests (#5314)
ahsan-z-khan Sep 29, 2025
35b5a83
Allowlisting for PyTorch 2.6 inference ARM image (#5310)
jinyan-li1 Sep 29, 2025
ff1ed6d
test pytorch 2.8 ec2
Jyothirmaikottu Sep 29, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
14 changes: 7 additions & 7 deletions .github/CODEOWNERS
Original file line number Diff line number Diff line change
Expand Up @@ -50,10 +50,10 @@ dgl_tests/ @aws/dlc-dgl-reviewers
*triton* @aws/dlc-triton-reviewers

# Files under stabilityai/ and huggingface/ directories can be directly reviewed by below teams
stabilityai/ @aws/sagemaker-1p-algorithms
huggingface/ @aws/sagemaker-1p-algorithms
test/sagemaker_tests/huggingface/ @aws/sagemaker-1p-algorithms
test/sagemaker_tests/huggingface_pytorch/ @aws/sagemaker-1p-algorithms
test/sagemaker_tests/huggingface_tensorflow/ @aws/sagemaker-1p-algorithms
test/sagemaker_tests/pytorch/inference/integration/sagemaker/test_stabilityai.py @aws/sagemaker-1p-algorithms
test/sagemaker_tests/pytorch/inference/resources/stabilityai/ @aws/sagemaker-1p-algorithms
stabilityai/ @aws/dl-containers
huggingface/ @aws/dl-containers
test/sagemaker_tests/huggingface/ @aws/dl-containers
test/sagemaker_tests/huggingface_pytorch/ @aws/dl-containers
test/sagemaker_tests/huggingface_tensorflow/ @aws/dl-containers
test/sagemaker_tests/pytorch/inference/integration/sagemaker/test_stabilityai.py @aws/dl-containers
test/sagemaker_tests/pytorch/inference/resources/stabilityai/ @aws/dl-containers
4 changes: 4 additions & 0 deletions available_images.md
Original file line number Diff line number Diff line change
Expand Up @@ -366,8 +366,12 @@ Note: Starting from Neuron SDK 2.17.0, Dockerfiles for PyTorch Neuron Containers

| Framework | Neuron Package | Neuron SDK Version | Job Type | Supported EC2 Instance Types | Python Version Options | Example URL |
|----------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------|--------------------|-----------|------------------------------|------------------------|----------------------------------------------------------------------------------------------------------------------|
| [PyTorch 2.8.0](https://github.com/aws-neuron/deep-learning-containers/blob/2.26.0/docker/pytorch/inference/2.8.0/Dockerfile.neuronx) | torch-neuronx, neuronx_distributed, neuronx_distributed_inference | Neuron 2.26.0 | inference | trn1,trn2,inf2 | 3.11 (py311) | 763104351884.dkr.ecr.us-west-2.amazonaws.com/pytorch-inference-neuronx:2.8.0-neuronx-py311-sdk2.26.0-ubuntu22.04 |
| [PyTorch 2.8.0](https://github.com/aws-neuron/deep-learning-containers/blob/2.26.0/docker/pytorch/training/2.8.0/Dockerfile.neuronx) | torch-neuronx, neuronx_distributed, neuronx_distributed_training | Neuron 2.26.0 | training | trn1,trn2,inf2 | 3.11 (py311) | 763104351884.dkr.ecr.us-west-2.amazonaws.com/pytorch-training-neuronx:2.8.0-neuronx-py311-sdk2.26.0-ubuntu22.04 |
| [PyTorch 2.7.0](https://github.com/aws-neuron/deep-learning-containers/blob/2.25.0/docker/pytorch/inference/2.7.0/Dockerfile.neuronx) | torch-neuronx, transformers-neuronx, neuronx_distributed, neuronx_distributed_inference | Neuron 2.25.0 | inference | trn1,trn2,inf2 | 3.10 (py310) | 763104351884.dkr.ecr.us-west-2.amazonaws.com/pytorch-inference-neuronx:2.7.0-neuronx-py310-sdk2.25.0-ubuntu22.04 |
| [PyTorch 2.7.0](https://github.com/aws-neuron/deep-learning-containers/blob/2.25.0/docker/pytorch/training/2.7.0/Dockerfile.neuronx) | torch-neuronx, transformers-neuronx, neuronx_distributed, neuronx_distributed_training | Neuron 2.25.0 | training | trn1,trn2,inf2 | 3.10 (py310) | 763104351884.dkr.ecr.us-west-2.amazonaws.com/pytorch-training-neuronx:2.7.0-neuronx-py310-sdk2.25.0-ubuntu22.04 |
| [PyTorch 2.7.0](https://github.com/aws-neuron/deep-learning-containers/blob/2.24.1/docker/pytorch/inference/2.7.0/Dockerfile.neuronx) | torch-neuronx, transformers-neuronx, neuronx_distributed, neuronx_distributed_inference | Neuron 2.24.1 | inference | trn1,trn2,inf2 | 3.10 (py310) | 763104351884.dkr.ecr.us-west-2.amazonaws.com/pytorch-inference-neuronx:2.7.0-neuronx-py310-sdk2.24.1-ubuntu22.04 |
| [PyTorch 2.7.0](https://github.com/aws-neuron/deep-learning-containers/blob/2.24.1/docker/pytorch/training/2.7.0/Dockerfile.neuronx) | torch-neuronx, transformers-neuronx, neuronx_distributed, neuronx_distributed_training | Neuron 2.24.1 | training | trn1,trn2,inf2 | 3.10 (py310) | 763104351884.dkr.ecr.us-west-2.amazonaws.com/pytorch-training-neuronx:2.7.0-neuronx-py310-sdk2.24.1-ubuntu22.04 |
| [PyTorch 2.6.0](https://github.com/aws-neuron/deep-learning-containers/blob/2.23.0/docker/pytorch/inference/2.6.0/Dockerfile.neuronx) | torch-neuronx, transformers-neuronx, neuronx_distributed, neuronx_distributed_inference | Neuron 2.23.0 | inference | trn1,trn2,inf2 | 3.10 (py310) | 763104351884.dkr.ecr.us-west-2.amazonaws.com/pytorch-inference-neuronx:2.6.0-neuronx-py310-sdk2.23.0-ubuntu22.04 |
| [PyTorch 2.6.0](https://github.com/aws-neuron/deep-learning-containers/blob/2.23.0/docker/pytorch/training/2.6.0/Dockerfile.neuronx) | torch-neuronx, transformers-neuronx, neuronx_distributed, neuronx_distributed_training | Neuron 2.23.0 | training | trn1,trn2,inf2 | 3.10 (py310) | 763104351884.dkr.ecr.us-west-2.amazonaws.com/pytorch-training-neuronx:2.6.0-neuronx-py310-sdk2.23.0-ubuntu22.04 |
| [PyTorch 2.5.1](https://github.com/aws-neuron/deep-learning-containers/blob/2.22.0/docker/pytorch/inference/2.5.1/Dockerfile.neuronx) | torch-neuronx, transformers-neuronx, neuronx_distributed, neuronx_distributed_inference | Neuron 2.22.0 | inference | trn1,trn2,inf2 | 3.10 (py310) | 763104351884.dkr.ecr.us-west-2.amazonaws.com/pytorch-inference-neuronx:2.5.1-neuronx-py310-sdk2.22.0-ubuntu22.04 |
Expand Down
6 changes: 3 additions & 3 deletions dlc_developer_config.toml
Original file line number Diff line number Diff line change
Expand Up @@ -37,12 +37,12 @@ deep_canary_mode = false
[build]
# Add in frameworks you would like to build. By default, builds are disabled unless you specify building an image.
# available frameworks - ["base", "vllm", "autogluon", "huggingface_tensorflow", "huggingface_pytorch", "huggingface_tensorflow_trcomp", "huggingface_pytorch_trcomp", "pytorch_trcomp", "tensorflow", "pytorch", "stabilityai_pytorch"]
build_frameworks = []
build_frameworks = ["pytorch"]


# By default we build both training and inference containers. Set true/false values to determine which to build.
build_training = true
build_inference = true
build_inference = false

# Set do_build to "false" to skip builds and test the latest image built by this PR
# Note: at least one build is required to set do_build to "false"
Expand Down Expand Up @@ -122,7 +122,7 @@ use_scheduler = false
dlc-pr-base = ""

# Standard Framework Training
dlc-pr-pytorch-training = ""
dlc-pr-pytorch-training = "pytorch/training/buildspec-2-8-ec2.yml"
dlc-pr-tensorflow-2-training = ""
dlc-pr-autogluon-training = ""

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -845,6 +845,35 @@
}
],
"linux-libc-dev": [
{
"description": "In the Linux kernel, the following vulnerability has been resolved: of: module: add buffer overflow check in of_modalias(). In of_modalias(), if the buffer happens to be too small even for the 1st snprintf() call, the len parameter will become negative and str parameter (if not NULL initially) will point beyond the buffer's end. Add the buffer overflow check after the 1st snprintf() call and fix such check after the strlen() call (accounting for the terminating NUL char).",
"vulnerability_id": "CVE-2024-38541",
"name": "CVE-2024-38541",
"package_name": "linux-libc-dev",
"package_details": {
"file_path": null,
"name": "linux-libc-dev",
"package_manager": "OS",
"version": "5.4.0",
"release": "192.212"
},
"remediation": {
"recommendation": {
"text": "None Provided"
}
},
"cvss_v3_score": 7.8,
"cvss_v30_score": 0.0,
"cvss_v31_score": 7.8,
"cvss_v2_score": 0.0,
"cvss_v3_severity": "HIGH",
"source_url": "https://ubuntu.com/security/CVE-2024-38541",
"source": "UBUNTU_CVE",
"severity": "CRITICAL",
"status": "ACTIVE",
"title": "CVE-2024-38541 - linux-libc-dev",
"reason_to_ignore": "N/A"
},
{
"description":"In the Linux kernel, the following vulnerability has been resolved: greybus: Fix use-after-free bug in gb_interface_release due to race condition. In gb_interface_create, &intf->mode_switch_completion is bound with gb_interface_mode_switch_work. Then it will be started by gb_interface_request_mode_switch. Here is the relevant code. if (!queue_work(system_long_wq, &intf->mode_switch_work)) { ... } If we call gb_interface_release to make cleanup, there may be an unfinished work. This function will call kfree to free the object \"intf\". However, if gb_interface_mode_switch_work is scheduled to run after kfree, it may cause use-after-free error as gb_interface_mode_switch_work will use the object \"intf\". The possible execution flow that may lead to the issue is as follows: CPU0 CPU1 | gb_interface_create | gb_interface_request_mode_switch gb_interface_release | kfree(intf) (free) | | gb_interface_mode_switch_work | mutex_lock(&intf->mutex) (use) Fix it by canceling the work before kfree.",
"vulnerability_id":"CVE-2024-39495",
Expand Down
2 changes: 1 addition & 1 deletion pytorch/inference/buildspec-arm64-2-5-sm.yml
Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,7 @@ images:
torch_serve_version: &TORCHSERVE_VERSION 0.12.0
tool_kit_version: &SM_TOOLKIT_VERSION 2.0.25
tag: !join [ *VERSION, "-", *DEVICE_TYPE, "-", *TAG_PYTHON_VERSION, "-", *OS_VERSION , "-sagemaker"]
latest_release_tag: !join [ *VERSION, "-", *DEVICE_TYPE, "-", *TAG_PYTHON_VERSION, "-", *OS_VERSION, "-sagemaker" ]
# latest_release_tag: !join [ *VERSION, "-", *DEVICE_TYPE, "-", *TAG_PYTHON_VERSION, "-", *OS_VERSION, "-sagemaker" ]
# skip_build: "False"
docker_file: !join [ docker/, *SHORT_VERSION, /, *DOCKER_PYTHON_VERSION, /Dockerfile.arm64., *DEVICE_TYPE ]
target: sagemaker
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,5 +29,67 @@
"title": "CVE-2025-32434 - torch",
"reason_to_ignore": "N/A"
}
],
"dpkg": [
{
"description": "It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.",
"vulnerability_id": "CVE-2025-6297",
"name": "CVE-2025-6297",
"package_name": "dpkg",
"package_details": {
"file_path": null,
"name": "dpkg",
"package_manager": "OS",
"version": "1.21.1ubuntu2.3",
"release": null
},
"remediation": {
"recommendation": {
"text": "None Provided"
}
},
"cvss_v3_score": 8.2,
"cvss_v30_score": 0.0,
"cvss_v31_score": 8.2,
"cvss_v2_score": 0.0,
"cvss_v3_severity": "HIGH",
"source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-6297.html",
"source": "UBUNTU_CVE",
"severity": "HIGH",
"status": "ACTIVE",
"title": "CVE-2025-6297 - dpkg, libdpkg-perl",
"reason_to_ignore": "N/A"
}
],
"libdpkg-perl": [
{
"description": "It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.",
"vulnerability_id": "CVE-2025-6297",
"name": "CVE-2025-6297",
"package_name": "libdpkg-perl",
"package_details": {
"file_path": null,
"name": "libdpkg-perl",
"package_manager": "OS",
"version": "1.21.1ubuntu2.3",
"release": null
},
"remediation": {
"recommendation": {
"text": "None Provided"
}
},
"cvss_v3_score": 8.2,
"cvss_v30_score": 0.0,
"cvss_v31_score": 8.2,
"cvss_v2_score": 0.0,
"cvss_v3_severity": "HIGH",
"source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-6297.html",
"source": "UBUNTU_CVE",
"severity": "HIGH",
"status": "ACTIVE",
"title": "CVE-2025-6297 - dpkg, libdpkg-perl",
"reason_to_ignore": "N/A"
}
]
}
Original file line number Diff line number Diff line change
Expand Up @@ -89,5 +89,67 @@
"title": "CVE-2025-32434 - torch",
"reason_to_ignore": "N/A"
}
],
"dpkg": [
{
"description": "It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.",
"vulnerability_id": "CVE-2025-6297",
"name": "CVE-2025-6297",
"package_name": "dpkg",
"package_details": {
"file_path": null,
"name": "dpkg",
"package_manager": "OS",
"version": "1.21.1ubuntu2.3",
"release": null
},
"remediation": {
"recommendation": {
"text": "None Provided"
}
},
"cvss_v3_score": 8.2,
"cvss_v30_score": 0.0,
"cvss_v31_score": 8.2,
"cvss_v2_score": 0.0,
"cvss_v3_severity": "HIGH",
"source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-6297.html",
"source": "UBUNTU_CVE",
"severity": "HIGH",
"status": "ACTIVE",
"title": "CVE-2025-6297 - dpkg, libdpkg-perl",
"reason_to_ignore": "N/A"
}
],
"libdpkg-perl": [
{
"description": "It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.",
"vulnerability_id": "CVE-2025-6297",
"name": "CVE-2025-6297",
"package_name": "libdpkg-perl",
"package_details": {
"file_path": null,
"name": "libdpkg-perl",
"package_manager": "OS",
"version": "1.21.1ubuntu2.3",
"release": null
},
"remediation": {
"recommendation": {
"text": "None Provided"
}
},
"cvss_v3_score": 8.2,
"cvss_v30_score": 0.0,
"cvss_v31_score": 8.2,
"cvss_v2_score": 0.0,
"cvss_v3_severity": "HIGH",
"source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-6297.html",
"source": "UBUNTU_CVE",
"severity": "HIGH",
"status": "ACTIVE",
"title": "CVE-2025-6297 - dpkg, libdpkg-perl",
"reason_to_ignore": "N/A"
}
]
}
Original file line number Diff line number Diff line change
Expand Up @@ -29,5 +29,67 @@
"title": "CVE-2025-32434 - torch",
"reason_to_ignore": "N/A"
}
],
"dpkg": [
{
"description": "It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.",
"vulnerability_id": "CVE-2025-6297",
"name": "CVE-2025-6297",
"package_name": "dpkg",
"package_details": {
"file_path": null,
"name": "dpkg",
"package_manager": "OS",
"version": "1.21.1ubuntu2.3",
"release": null
},
"remediation": {
"recommendation": {
"text": "None Provided"
}
},
"cvss_v3_score": 8.2,
"cvss_v30_score": 0.0,
"cvss_v31_score": 8.2,
"cvss_v2_score": 0.0,
"cvss_v3_severity": "HIGH",
"source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-6297.html",
"source": "UBUNTU_CVE",
"severity": "HIGH",
"status": "ACTIVE",
"title": "CVE-2025-6297 - dpkg, libdpkg-perl",
"reason_to_ignore": "N/A"
}
],
"libdpkg-perl": [
{
"description": "It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.",
"vulnerability_id": "CVE-2025-6297",
"name": "CVE-2025-6297",
"package_name": "libdpkg-perl",
"package_details": {
"file_path": null,
"name": "libdpkg-perl",
"package_manager": "OS",
"version": "1.21.1ubuntu2.3",
"release": null
},
"remediation": {
"recommendation": {
"text": "None Provided"
}
},
"cvss_v3_score": 8.2,
"cvss_v30_score": 0.0,
"cvss_v31_score": 8.2,
"cvss_v2_score": 0.0,
"cvss_v3_severity": "HIGH",
"source_url": "https://people.canonical.com/~ubuntu-security/cve/2025/CVE-2025-6297.html",
"source": "UBUNTU_CVE",
"severity": "HIGH",
"status": "ACTIVE",
"title": "CVE-2025-6297 - dpkg, libdpkg-perl",
"reason_to_ignore": "N/A"
}
]
}
Loading