Skip to content

Commit 22deeb8

Browse files
Fix cve security_test failure for TF 2.18 (#5145)
* build ec2 * revert toml
1 parent 1130569 commit 22deeb8

File tree

2 files changed

+34
-34
lines changed

2 files changed

+34
-34
lines changed

tensorflow/training/docker/2.18/py3/Dockerfile.ec2.cpu.os_scan_allowlist.json

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -2494,27 +2494,27 @@
24942494
],
24952495
"protobuf": [
24962496
{
2497-
"description": "Any project that uses Protobuf Pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application with a RecursionError. We recommend upgrading to version =>6.31.1 or beyond commit 17838beda2943d08b8a9d4df5b68f5f04f26d901",
2497+
"description": "Any project that uses Protobuf Pure-Python backend\u00a0to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP\u00a0tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application with a RecursionError. We recommend upgrading to version =>6.31.1 or beyond commit\u00a017838beda2943d08b8a9d4df5b68f5f04f26d901",
24982498
"vulnerability_id": "CVE-2025-4565",
24992499
"name": "CVE-2025-4565",
25002500
"package_name": "protobuf",
25012501
"package_details": {
2502-
"file_path": "/usr/local/lib/python3.10/site-packages/protobuf-4.21.12.dist-info/METADATA",
2503-
"name": "protobuf",
2504-
"package_manager": "PYTHON",
2505-
"version": "4.21.12",
2506-
"release": null
2507-
},
2508-
"remediation": { "recommendation": { "text": "None Provided" } },
2509-
"cvss_v3_score": 0.0,
2510-
"cvss_v30_score": 0.0,
2511-
"cvss_v31_score": 0.0,
2512-
"cvss_v2_score": 0.0,
2513-
"cvss_v3_severity": "CRITICAL",
2514-
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4565",
2515-
"source": "NVD",
2516-
"severity": "HIGH",
2517-
"status": "ACTIVE",
2502+
"file_path": "/usr/local/lib/python3.10/site-packages/protobuf-4.21.12.dist-info/METADATA",
2503+
"name": "protobuf",
2504+
"package_manager": "PYTHON",
2505+
"version": "4.21.12",
2506+
"release": null
2507+
},
2508+
"remediation": {"recommendation": {"text": "None Provided"}},
2509+
"cvss_v3_score": 7.5,
2510+
"cvss_v30_score": 0.0,
2511+
"cvss_v31_score": 7.5,
2512+
"cvss_v2_score": 0.0,
2513+
"cvss_v3_severity": "HIGH",
2514+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4565",
2515+
"source": "NVD",
2516+
"severity": "HIGH",
2517+
"status": "ACTIVE",
25182518
"title": "CVE-2025-4565 - protobuf",
25192519
"reason_to_ignore": "protobuf upgrade is not possible at the moment - this version has dependency with tensorflow metadata "
25202520
}

tensorflow/training/docker/2.18/py3/cu125/Dockerfile.ec2.gpu.os_scan_allowlist.json

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -2494,27 +2494,27 @@
24942494
],
24952495
"protobuf": [
24962496
{
2497-
"description": "Any project that uses Protobuf Pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application with a RecursionError. We recommend upgrading to version =>6.31.1 or beyond commit 17838beda2943d08b8a9d4df5b68f5f04f26d901",
2497+
"description": "Any project that uses Protobuf Pure-Python backend\u00a0to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP\u00a0tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application with a RecursionError. We recommend upgrading to version =>6.31.1 or beyond commit\u00a017838beda2943d08b8a9d4df5b68f5f04f26d901",
24982498
"vulnerability_id": "CVE-2025-4565",
24992499
"name": "CVE-2025-4565",
25002500
"package_name": "protobuf",
25012501
"package_details": {
2502-
"file_path": "/usr/local/lib/python3.10/site-packages/protobuf-4.21.12.dist-info/METADATA",
2503-
"name": "protobuf",
2504-
"package_manager": "PYTHON",
2505-
"version": "4.21.12",
2506-
"release": null
2507-
},
2508-
"remediation": { "recommendation": { "text": "None Provided" } },
2509-
"cvss_v3_score": 0.0,
2510-
"cvss_v30_score": 0.0,
2511-
"cvss_v31_score": 0.0,
2512-
"cvss_v2_score": 0.0,
2513-
"cvss_v3_severity": "CRITICAL",
2514-
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4565",
2515-
"source": "NVD",
2516-
"severity": "HIGH",
2517-
"status": "ACTIVE",
2502+
"file_path": "/usr/local/lib/python3.10/site-packages/protobuf-4.21.12.dist-info/METADATA",
2503+
"name": "protobuf",
2504+
"package_manager": "PYTHON",
2505+
"version": "4.21.12",
2506+
"release": null
2507+
},
2508+
"remediation": {"recommendation": {"text": "None Provided"}},
2509+
"cvss_v3_score": 7.5,
2510+
"cvss_v30_score": 0.0,
2511+
"cvss_v31_score": 7.5,
2512+
"cvss_v2_score": 0.0,
2513+
"cvss_v3_severity": "HIGH",
2514+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4565",
2515+
"source": "NVD",
2516+
"severity": "HIGH",
2517+
"status": "ACTIVE",
25182518
"title": "CVE-2025-4565 - protobuf",
25192519
"reason_to_ignore": "protobuf upgrade is not possible at the moment - this version has dependency with tensorflow metadata "
25202520
}

0 commit comments

Comments
 (0)