Skip to content

Commit

Permalink
nvm, its because its picking up the wrong dict
Browse files Browse the repository at this point in the history
  • Loading branch information
timkuo-amazon committed Feb 12, 2025
1 parent 7a1b1cb commit 8c043aa
Show file tree
Hide file tree
Showing 3 changed files with 5 additions and 3 deletions.
3 changes: 2 additions & 1 deletion data/ignore_ids_safety_scan.json
Original file line number Diff line number Diff line change
Expand Up @@ -1450,7 +1450,8 @@
"67599": "** DISPUTED ** An issue was discovered in pip (all versions) because it installs the version with the highest version number, even if the user had intended to obtain a private package from a private index. This only affects use of the --extra-index-url option, and exploitation requires that the package does not already exist in the public index (and thus the attacker can put the package there with an arbitrary version number). NOTE: it has been reported that this is intended functionality and the user is responsible for using --extra-index-url securely.",
"70612": "The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing.",
"71671": "Pytorch version upgrade needs to be handled in a separate image",
"71672": "Pytorch version upgrade needs to be handled in a separate image"
"71672": "Pytorch version upgrade needs to be handled in a separate image",
"74882": "Ignoring due to Safety picking this up. This is already covered in our own scan config"
}
},
"training-neuronx": {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,5 @@
"71671": "[Package: torch] Core torch package version 2.1 affected, cannot be changed in PyTorch 2.1 DLC advisory='PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in the component /runtime/vararg_functions.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.'",
"71672": "[Package: torch] Core torch package version 2.1 affected, cannot be changed in PyTorch 2.1 DLC advisory='Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in torch/csrc/jit/mobile/interpreter.cpp.'",
"73169": "Sentence-transformers affected versions are vulnerable to arbitrary code execution when loading PyTorch model files. The `torch.load()` function, used without the `weights_only=True` parameter, could deserialize malicious Python objects from manipulated model files. This vulnerability potentially allows attackers to execute arbitrary code on the system.",
"71064": "Affected versions of Requests, when making requests through a Requests `Session`, if the first request is made with `verify=False` to disable cert verification, all subsequent requests to the same host will continue to ignore cert verification regardless of changes to the value of `verify`. This behavior will continue for the lifecycle of the connection in the connection pool. Requests 2.32.0 fixes the issue, but versions 2.32.0 and 2.32.1 were yanked due to conflicts with CVE-2024-35195 mitigation.",
"74882": "Ignoring due to Safety picking this up. This is already covered in our own scan config"
"71064": "Affected versions of Requests, when making requests through a Requests `Session`, if the first request is made with `verify=False` to disable cert verification, all subsequent requests to the same host will continue to ignore cert verification regardless of changes to the value of `verify`. This behavior will continue for the lifecycle of the connection in the connection pool. Requests 2.32.0 fixes the issue, but versions 2.32.0 and 2.32.1 were yanked due to conflicts with CVE-2024-35195 mitigation."
}
2 changes: 2 additions & 0 deletions src/utils.py
Original file line number Diff line number Diff line change
Expand Up @@ -281,6 +281,8 @@ def get_safety_ignore_dict(image_uri, framework, python_version, job_type):
job_type = (
"inference-eia"
if "eia" in image_uri
else "inference-neuronx"
if "neuronx" in image_uri
else "inference-neuron"
if "neuron" in image_uri
else "inference"
Expand Down

0 comments on commit 8c043aa

Please sign in to comment.