You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add Dockerfiles for Neuron DLC with SDK 2.20.2 (#29)
*Issue #, if available:*
*Description of changes:*
By submitting this pull request, I confirm that you can use, modify,
copy, and redistribute this contribution, under the terms of your
choice.
"description": "PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in the component /runtime/vararg_functions.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.",
Copy file name to clipboardExpand all lines: docker/pytorch/training/2.1.2/Dockerfile.neuronx.cve_allowlist.json
+40-62Lines changed: 40 additions & 62 deletions
Original file line number
Diff line number
Diff line change
@@ -1,81 +1,34 @@
1
1
{
2
-
"CVE-2023-6730": {
3
-
"description": "Deserialization of Untrusted Data in GitHub repository huggingface/transformers prior to 4.36.",
2
+
"CVE-2022-40897": {
3
+
"description": "Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py.",
"description": "A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.",
0 commit comments