Skip to content

Commit 9a156d1

Browse files
authored
Add Dockerfiles for Neuron DLC with SDK 2.18.2 (#14)
*Description of changes:* Add Dockerfiles for Neuron DLC with SDK 2.18.2 By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice. Signed-off-by: Ziwen Ning <ningziwe@amazon.com>
1 parent 3c03a7f commit 9a156d1

9 files changed

+191
-115
lines changed

docker/pytorch/inference/1.13.1/Dockerfile.neuron.cve_allowlist.json

Lines changed: 29 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -12,80 +12,72 @@
1212
"source": "NVD",
1313
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2511",
1414
"status": "ACTIVE",
15-
"title": "CVE-2024-2511 - pyOpenSSL, cryptography",
15+
"title": "CVE-2024-2511 - cryptography, pyOpenSSL",
1616
"vulnerability_id": "CVE-2024-2511",
1717
"vulnerable_packages": [
1818
{
1919
"epoch": 0,
20-
"filePath": "opt/conda/lib/python3.10/site-packages/pyOpenSSL-24.0.0.dist-info/METADATA",
21-
"name": "pyOpenSSL",
20+
"filePath": "opt/conda/lib/python3.10/site-packages/cryptography-42.0.5.dist-info/METADATA",
21+
"name": "cryptography",
2222
"packageManager": "PYTHONPKG",
23-
"version": "24.0.0"
23+
"version": "42.0.5"
2424
},
2525
{
2626
"epoch": 0,
27-
"filePath": "opt/conda/lib/python3.10/site-packages/cryptography-42.0.5.dist-info/METADATA",
28-
"name": "cryptography",
27+
"filePath": "opt/conda/lib/python3.10/site-packages/pyOpenSSL-24.0.0.dist-info/METADATA",
28+
"name": "pyOpenSSL",
2929
"packageManager": "PYTHONPKG",
30-
"version": "42.0.5"
30+
"version": "24.0.0"
3131
}
3232
]
3333
},
34-
"GHSA-jjg7-2v4v-x38h": {
35-
"description": "### Impact\nA specially crafted argument to the `idna.encode()` function could consume significant resources. This may lead to a denial-of-service.\n\n### Patches\nThe function has been refined to reject such strings without the associated resource consumption in version 3.7.\n\n### Workarounds\nDomain names cannot exceed 253 characters in length, if this length limit is enforced prior to passing the domain to the `idna.encode()` function it should no longer consume significant resources. This is triggered by arbitrarily large inputs that would not occur in normal usage, but may be passed to the library assuming there is no preliminary input validation by the higher-level application.\n\n### References\n* https://huntr.com/bounties/93d78d07-d791-4b39-a845-cbfabc44aadb",
34+
"CVE-2024-31580": {
35+
"description": "PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in the component /runtime/vararg_functions.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.",
3636
"remediation": {
3737
"recommendation": {
3838
"text": "None Provided"
3939
}
4040
},
4141
"score": 0.0,
4242
"score_details": {},
43-
"severity": "MEDIUM",
44-
"source": "GITHUB",
45-
"source_url": "https://github.com/advisories/GHSA-jjg7-2v4v-x38h",
43+
"severity": "UNTRIAGED",
44+
"source": "NVD",
45+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31580",
4646
"status": "ACTIVE",
47-
"title": "GHSA-jjg7-2v4v-x38h - idna",
48-
"vulnerability_id": "GHSA-jjg7-2v4v-x38h",
47+
"title": "CVE-2024-31580 - torch",
48+
"vulnerability_id": "CVE-2024-31580",
4949
"vulnerable_packages": [
5050
{
5151
"epoch": 0,
52-
"filePath": "opt/conda/lib/python3.10/site-packages/idna-3.6.dist-info/METADATA",
53-
"name": "idna",
52+
"filePath": "opt/conda/lib/python3.10/site-packages/torch-1.13.1.dist-info/METADATA",
53+
"name": "torch",
5454
"packageManager": "PYTHONPKG",
55-
"version": "3.6"
55+
"version": "1.13.1"
5656
}
5757
]
5858
},
59-
"SNYK-PYTHON-IDNA-6597975": {
60-
"description": "## Overview\n\nAffected versions of this package are vulnerable to Resource Exhaustion via the `idna.encode` function. An attacker can consume significant resources and potentially cause a denial-of-service by supplying specially crafted arguments to this function. \r\n\r\n**Note:**\r\nThis is triggered by arbitrarily large inputs that would not occur in normal usage but may be passed to the library assuming there is no preliminary input validation by the higher-level application.\n## Remediation\nUpgrade `idna` to version 3.7 or higher.\n## References\n- [GitHub Commit](https://github.com/kjd/idna/commit/5beb28b9dd77912c0dd656d8b0fdba3eb80222e7)",
59+
"CVE-2024-31583": {
60+
"description": "Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in torch/csrc/jit/mobile/interpreter.cpp.",
6161
"remediation": {
6262
"recommendation": {
6363
"text": "None Provided"
6464
}
6565
},
66-
"score": 6.2,
67-
"score_details": {
68-
"cvss": {
69-
"adjustments": [],
70-
"score": 6.2,
71-
"scoreSource": "SNYK",
72-
"scoringVector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
73-
"version": "3.1"
74-
}
75-
},
76-
"severity": "MEDIUM",
77-
"source": "SNYK",
78-
"source_url": "https://security.snyk.io/vuln/SNYK-PYTHON-IDNA-6597975",
66+
"score": 0.0,
67+
"score_details": {},
68+
"severity": "UNTRIAGED",
69+
"source": "NVD",
70+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31583",
7971
"status": "ACTIVE",
80-
"title": "IN1-PYTHON-IDNA-6597975 - idna",
81-
"vulnerability_id": "SNYK-PYTHON-IDNA-6597975",
72+
"title": "CVE-2024-31583 - torch",
73+
"vulnerability_id": "CVE-2024-31583",
8274
"vulnerable_packages": [
8375
{
8476
"epoch": 0,
85-
"filePath": "opt/conda/lib/python3.10/site-packages/idna-3.6.dist-info/METADATA",
86-
"name": "idna",
77+
"filePath": "opt/conda/lib/python3.10/site-packages/torch-1.13.1.dist-info/METADATA",
78+
"name": "torch",
8779
"packageManager": "PYTHONPKG",
88-
"version": "3.6"
80+
"version": "1.13.1"
8981
}
9082
]
9183
}

docker/pytorch/inference/1.13.1/Dockerfile.neuronx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ LABEL com.amazonaws.sagemaker.capabilities.accept-bind-to-port=true
77
# Neuron SDK components version numbers
88
ARG NEURONX_FRAMEWORK_VERSION=1.13.1.1.14.0
99
ARG NEURONX_DISTRIBUTED_VERSION=0.7.0
10-
ARG NEURONX_CC_VERSION=2.13.68.0
10+
ARG NEURONX_CC_VERSION=2.13.72.0
1111
ARG NEURONX_TRANSFORMERS_VERSION=0.10.0.360
1212
ARG NEURONX_COLLECTIVES_LIB_VERSION=2.20.22.0-c101c322e
1313
ARG NEURONX_RUNTIME_LIB_VERSION=2.20.22.0-1b3ca6425

docker/pytorch/inference/1.13.1/Dockerfile.neuronx.cve_allowlist.json

Lines changed: 29 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -12,80 +12,72 @@
1212
"source": "NVD",
1313
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2511",
1414
"status": "ACTIVE",
15-
"title": "CVE-2024-2511 - pyOpenSSL, cryptography",
15+
"title": "CVE-2024-2511 - cryptography, pyOpenSSL",
1616
"vulnerability_id": "CVE-2024-2511",
1717
"vulnerable_packages": [
1818
{
1919
"epoch": 0,
20-
"filePath": "opt/conda/lib/python3.10/site-packages/pyOpenSSL-24.0.0.dist-info/METADATA",
21-
"name": "pyOpenSSL",
20+
"filePath": "opt/conda/lib/python3.10/site-packages/cryptography-42.0.5.dist-info/METADATA",
21+
"name": "cryptography",
2222
"packageManager": "PYTHONPKG",
23-
"version": "24.0.0"
23+
"version": "42.0.5"
2424
},
2525
{
2626
"epoch": 0,
27-
"filePath": "opt/conda/lib/python3.10/site-packages/cryptography-42.0.5.dist-info/METADATA",
28-
"name": "cryptography",
27+
"filePath": "opt/conda/lib/python3.10/site-packages/pyOpenSSL-24.0.0.dist-info/METADATA",
28+
"name": "pyOpenSSL",
2929
"packageManager": "PYTHONPKG",
30-
"version": "42.0.5"
30+
"version": "24.0.0"
3131
}
3232
]
3333
},
34-
"GHSA-jjg7-2v4v-x38h": {
35-
"description": "### Impact\nA specially crafted argument to the `idna.encode()` function could consume significant resources. This may lead to a denial-of-service.\n\n### Patches\nThe function has been refined to reject such strings without the associated resource consumption in version 3.7.\n\n### Workarounds\nDomain names cannot exceed 253 characters in length, if this length limit is enforced prior to passing the domain to the `idna.encode()` function it should no longer consume significant resources. This is triggered by arbitrarily large inputs that would not occur in normal usage, but may be passed to the library assuming there is no preliminary input validation by the higher-level application.\n\n### References\n* https://huntr.com/bounties/93d78d07-d791-4b39-a845-cbfabc44aadb",
34+
"CVE-2024-31580": {
35+
"description": "PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in the component /runtime/vararg_functions.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.",
3636
"remediation": {
3737
"recommendation": {
3838
"text": "None Provided"
3939
}
4040
},
4141
"score": 0.0,
4242
"score_details": {},
43-
"severity": "MEDIUM",
44-
"source": "GITHUB",
45-
"source_url": "https://github.com/advisories/GHSA-jjg7-2v4v-x38h",
43+
"severity": "UNTRIAGED",
44+
"source": "NVD",
45+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31580",
4646
"status": "ACTIVE",
47-
"title": "GHSA-jjg7-2v4v-x38h - idna",
48-
"vulnerability_id": "GHSA-jjg7-2v4v-x38h",
47+
"title": "CVE-2024-31580 - torch",
48+
"vulnerability_id": "CVE-2024-31580",
4949
"vulnerable_packages": [
5050
{
5151
"epoch": 0,
52-
"filePath": "opt/conda/lib/python3.10/site-packages/idna-3.6.dist-info/METADATA",
53-
"name": "idna",
52+
"filePath": "opt/conda/lib/python3.10/site-packages/torch-1.13.1.dist-info/METADATA",
53+
"name": "torch",
5454
"packageManager": "PYTHONPKG",
55-
"version": "3.6"
55+
"version": "1.13.1"
5656
}
5757
]
5858
},
59-
"SNYK-PYTHON-IDNA-6597975": {
60-
"description": "## Overview\n\nAffected versions of this package are vulnerable to Resource Exhaustion via the `idna.encode` function. An attacker can consume significant resources and potentially cause a denial-of-service by supplying specially crafted arguments to this function. \r\n\r\n**Note:**\r\nThis is triggered by arbitrarily large inputs that would not occur in normal usage but may be passed to the library assuming there is no preliminary input validation by the higher-level application.\n## Remediation\nUpgrade `idna` to version 3.7 or higher.\n## References\n- [GitHub Commit](https://github.com/kjd/idna/commit/5beb28b9dd77912c0dd656d8b0fdba3eb80222e7)",
59+
"CVE-2024-31583": {
60+
"description": "Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in torch/csrc/jit/mobile/interpreter.cpp.",
6161
"remediation": {
6262
"recommendation": {
6363
"text": "None Provided"
6464
}
6565
},
66-
"score": 6.2,
67-
"score_details": {
68-
"cvss": {
69-
"adjustments": [],
70-
"score": 6.2,
71-
"scoreSource": "SNYK",
72-
"scoringVector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
73-
"version": "3.1"
74-
}
75-
},
76-
"severity": "MEDIUM",
77-
"source": "SNYK",
78-
"source_url": "https://security.snyk.io/vuln/SNYK-PYTHON-IDNA-6597975",
66+
"score": 0.0,
67+
"score_details": {},
68+
"severity": "UNTRIAGED",
69+
"source": "NVD",
70+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31583",
7971
"status": "ACTIVE",
80-
"title": "IN1-PYTHON-IDNA-6597975 - idna",
81-
"vulnerability_id": "SNYK-PYTHON-IDNA-6597975",
72+
"title": "CVE-2024-31583 - torch",
73+
"vulnerability_id": "CVE-2024-31583",
8274
"vulnerable_packages": [
8375
{
8476
"epoch": 0,
85-
"filePath": "opt/conda/lib/python3.10/site-packages/idna-3.6.dist-info/METADATA",
86-
"name": "idna",
77+
"filePath": "opt/conda/lib/python3.10/site-packages/torch-1.13.1.dist-info/METADATA",
78+
"name": "torch",
8779
"packageManager": "PYTHONPKG",
88-
"version": "3.6"
80+
"version": "1.13.1"
8981
}
9082
]
9183
}

docker/pytorch/inference/2.1.2/Dockerfile.neuronx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ LABEL com.amazonaws.sagemaker.capabilities.accept-bind-to-port=true
66

77
# Neuron SDK components version numbers
88
ARG NEURONX_DISTRIBUTED_VERSION=0.7.0
9-
ARG NEURONX_CC_VERSION=2.13.68.0
9+
ARG NEURONX_CC_VERSION=2.13.72.0
1010
ARG NEURONX_FRAMEWORK_VERSION=2.1.2.2.1.0
1111
ARG NEURONX_TRANSFORMERS_VERSION=0.10.0.360
1212
ARG NEURONX_COLLECTIVES_LIB_VERSION=2.20.22.0-c101c322e

docker/pytorch/inference/2.1.2/Dockerfile.neuronx.cve_allowlist.json

Lines changed: 29 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -12,80 +12,72 @@
1212
"source": "NVD",
1313
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2511",
1414
"status": "ACTIVE",
15-
"title": "CVE-2024-2511 - cryptography, pyOpenSSL",
15+
"title": "CVE-2024-2511 - pyOpenSSL, cryptography",
1616
"vulnerability_id": "CVE-2024-2511",
1717
"vulnerable_packages": [
1818
{
1919
"epoch": 0,
20-
"filePath": "opt/conda/lib/python3.10/site-packages/cryptography-42.0.5.dist-info/METADATA",
21-
"name": "cryptography",
20+
"filePath": "opt/conda/lib/python3.10/site-packages/pyOpenSSL-24.0.0.dist-info/METADATA",
21+
"name": "pyOpenSSL",
2222
"packageManager": "PYTHONPKG",
23-
"version": "42.0.5"
23+
"version": "24.0.0"
2424
},
2525
{
2626
"epoch": 0,
27-
"filePath": "opt/conda/lib/python3.10/site-packages/pyOpenSSL-24.0.0.dist-info/METADATA",
28-
"name": "pyOpenSSL",
27+
"filePath": "opt/conda/lib/python3.10/site-packages/cryptography-42.0.5.dist-info/METADATA",
28+
"name": "cryptography",
2929
"packageManager": "PYTHONPKG",
30-
"version": "24.0.0"
30+
"version": "42.0.5"
3131
}
3232
]
3333
},
34-
"GHSA-jjg7-2v4v-x38h": {
35-
"description": "### Impact\nA specially crafted argument to the `idna.encode()` function could consume significant resources. This may lead to a denial-of-service.\n\n### Patches\nThe function has been refined to reject such strings without the associated resource consumption in version 3.7.\n\n### Workarounds\nDomain names cannot exceed 253 characters in length, if this length limit is enforced prior to passing the domain to the `idna.encode()` function it should no longer consume significant resources. This is triggered by arbitrarily large inputs that would not occur in normal usage, but may be passed to the library assuming there is no preliminary input validation by the higher-level application.\n\n### References\n* https://huntr.com/bounties/93d78d07-d791-4b39-a845-cbfabc44aadb",
34+
"CVE-2024-31580": {
35+
"description": "PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in the component /runtime/vararg_functions.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.",
3636
"remediation": {
3737
"recommendation": {
3838
"text": "None Provided"
3939
}
4040
},
4141
"score": 0.0,
4242
"score_details": {},
43-
"severity": "MEDIUM",
44-
"source": "GITHUB",
45-
"source_url": "https://github.com/advisories/GHSA-jjg7-2v4v-x38h",
43+
"severity": "UNTRIAGED",
44+
"source": "NVD",
45+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31580",
4646
"status": "ACTIVE",
47-
"title": "GHSA-jjg7-2v4v-x38h - idna",
48-
"vulnerability_id": "GHSA-jjg7-2v4v-x38h",
47+
"title": "CVE-2024-31580 - torch",
48+
"vulnerability_id": "CVE-2024-31580",
4949
"vulnerable_packages": [
5050
{
5151
"epoch": 0,
52-
"filePath": "opt/conda/lib/python3.10/site-packages/idna-3.6.dist-info/METADATA",
53-
"name": "idna",
52+
"filePath": "opt/conda/lib/python3.10/site-packages/torch-2.1.2.dist-info/METADATA",
53+
"name": "torch",
5454
"packageManager": "PYTHONPKG",
55-
"version": "3.6"
55+
"version": "2.1.2"
5656
}
5757
]
5858
},
59-
"SNYK-PYTHON-IDNA-6597975": {
60-
"description": "## Overview\n\nAffected versions of this package are vulnerable to Resource Exhaustion via the `idna.encode` function. An attacker can consume significant resources and potentially cause a denial-of-service by supplying specially crafted arguments to this function. \r\n\r\n**Note:**\r\nThis is triggered by arbitrarily large inputs that would not occur in normal usage but may be passed to the library assuming there is no preliminary input validation by the higher-level application.\n## Remediation\nUpgrade `idna` to version 3.7 or higher.\n## References\n- [GitHub Commit](https://github.com/kjd/idna/commit/5beb28b9dd77912c0dd656d8b0fdba3eb80222e7)",
59+
"CVE-2024-31583": {
60+
"description": "Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in torch/csrc/jit/mobile/interpreter.cpp.",
6161
"remediation": {
6262
"recommendation": {
6363
"text": "None Provided"
6464
}
6565
},
66-
"score": 6.2,
67-
"score_details": {
68-
"cvss": {
69-
"adjustments": [],
70-
"score": 6.2,
71-
"scoreSource": "SNYK",
72-
"scoringVector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
73-
"version": "3.1"
74-
}
75-
},
76-
"severity": "MEDIUM",
77-
"source": "SNYK",
78-
"source_url": "https://security.snyk.io/vuln/SNYK-PYTHON-IDNA-6597975",
66+
"score": 0.0,
67+
"score_details": {},
68+
"severity": "UNTRIAGED",
69+
"source": "NVD",
70+
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31583",
7971
"status": "ACTIVE",
80-
"title": "IN1-PYTHON-IDNA-6597975 - idna",
81-
"vulnerability_id": "SNYK-PYTHON-IDNA-6597975",
72+
"title": "CVE-2024-31583 - torch",
73+
"vulnerability_id": "CVE-2024-31583",
8274
"vulnerable_packages": [
8375
{
8476
"epoch": 0,
85-
"filePath": "opt/conda/lib/python3.10/site-packages/idna-3.6.dist-info/METADATA",
86-
"name": "idna",
77+
"filePath": "opt/conda/lib/python3.10/site-packages/torch-2.1.2.dist-info/METADATA",
78+
"name": "torch",
8779
"packageManager": "PYTHONPKG",
88-
"version": "3.6"
80+
"version": "2.1.2"
8981
}
9082
]
9183
}

docker/pytorch/training/1.13.1/Dockerfile.neuronx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ LABEL dlc_major_version="1"
66
# Neuron SDK components version numbers
77
ARG NEURONX_FRAMEWORK_VERSION=1.13.1.1.14.0
88
ARG NEURONX_DISTRIBUTED_VERSION=0.7.0
9-
ARG NEURONX_CC_VERSION=2.13.68.0
9+
ARG NEURONX_CC_VERSION=2.13.72.0
1010
ARG NEURONX_COLLECTIVES_LIB_VERSION=2.20.22.0-c101c322e
1111
ARG NEURONX_RUNTIME_LIB_VERSION=2.20.22.0-1b3ca6425
1212
ARG NEURONX_TOOLS_VERSION=2.17.1.0

0 commit comments

Comments
 (0)