Skip to content

Commit 3726871

Browse files
authored
[Patch] Build PyTorch 2.6 Inference ARM64 [off autopatch] (#5492)
* Build PyTorch 2.6 Inference ARM64
1 parent e423d0e commit 3726871

File tree

5 files changed

+8
-3
lines changed

5 files changed

+8
-3
lines changed
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
buildspec_pointer: buildspec-arm64-2-6-ec2.yml
1+
buildspec_pointer: buildspec-arm64-2-6-ec2.yml

pytorch/inference/docker/2.6/py3/Dockerfile.arm64.cpu

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -190,7 +190,6 @@ RUN chmod +x /usr/local/bin/dockerd-entrypoint.py
190190
# add telemetry
191191
COPY deep_learning_container.py /usr/local/bin/deep_learning_container.py
192192
RUN chmod +x /usr/local/bin/deep_learning_container.py
193-
# COPY sitecustomize.py /usr/local/lib/${PYTHON_SHORT_VERSION}/sitecustomize.py
194193

195194
RUN HOME_DIR=/root \
196195
&& curl -o ${HOME_DIR}/oss_compliance.zip https://aws-dlinfra-utilities.s3.amazonaws.com/oss_compliance.zip \
Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
{
2+
"78828": "Affected versions of the PyTorch package are vulnerable to Denial of Service (DoS) due to improper handling in the MKLDNN pooling implementation. The torch.mkldnn_max_pool2d function fails to properly validate input parameters, allowing crafted inputs to trigger resource exhaustion or crashes in the underlying MKLDNN library. An attacker with local access can exploit this vulnerability by passing specially crafted tensor dimensions or parameters to the max pooling function, causing the application to become unresponsive or crash."
3+
}

pytorch/inference/docker/2.6/py3/cu124/Dockerfile.arm64.gpu

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -173,6 +173,7 @@ RUN pip install --no-cache-dir \
173173
boto3 \
174174
scipy \
175175
opencv-python \
176+
arrow==1.3.0 \
176177
nvgpu \
177178
numpy \
178179
pyopenssl \
@@ -218,7 +219,6 @@ RUN chmod +x /usr/local/bin/dockerd-entrypoint.py
218219

219220
# add telemetry
220221
COPY deep_learning_container.py /usr/local/bin/deep_learning_container.py
221-
COPY sitecustomize.py /usr/local/lib/${PYTHON_SHORT_VERSION}/sitecustomize.py
222222
RUN chmod +x /usr/local/bin/deep_learning_container.py
223223

224224
RUN HOME_DIR=/root \
Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
{
2+
"78828": "Affected versions of the PyTorch package are vulnerable to Denial of Service (DoS) due to improper handling in the MKLDNN pooling implementation. The torch.mkldnn_max_pool2d function fails to properly validate input parameters, allowing crafted inputs to trigger resource exhaustion or crashes in the underlying MKLDNN library. An attacker with local access can exploit this vulnerability by passing specially crafted tensor dimensions or parameters to the max pooling function, causing the application to become unresponsive or crash."
3+
}

0 commit comments

Comments
 (0)