Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Dockerfiles for Neuron DLC with SDK 2.18.2 #14

Merged
merged 1 commit into from
May 1, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -12,80 +12,72 @@
"source": "NVD",
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2511",
"status": "ACTIVE",
"title": "CVE-2024-2511 - pyOpenSSL, cryptography",
"title": "CVE-2024-2511 - cryptography, pyOpenSSL",
"vulnerability_id": "CVE-2024-2511",
"vulnerable_packages": [
{
"epoch": 0,
"filePath": "opt/conda/lib/python3.10/site-packages/pyOpenSSL-24.0.0.dist-info/METADATA",
"name": "pyOpenSSL",
"filePath": "opt/conda/lib/python3.10/site-packages/cryptography-42.0.5.dist-info/METADATA",
"name": "cryptography",
"packageManager": "PYTHONPKG",
"version": "24.0.0"
"version": "42.0.5"
},
{
"epoch": 0,
"filePath": "opt/conda/lib/python3.10/site-packages/cryptography-42.0.5.dist-info/METADATA",
"name": "cryptography",
"filePath": "opt/conda/lib/python3.10/site-packages/pyOpenSSL-24.0.0.dist-info/METADATA",
"name": "pyOpenSSL",
"packageManager": "PYTHONPKG",
"version": "42.0.5"
"version": "24.0.0"
}
]
},
"GHSA-jjg7-2v4v-x38h": {
"description": "### Impact\nA specially crafted argument to the `idna.encode()` function could consume significant resources. This may lead to a denial-of-service.\n\n### Patches\nThe function has been refined to reject such strings without the associated resource consumption in version 3.7.\n\n### Workarounds\nDomain names cannot exceed 253 characters in length, if this length limit is enforced prior to passing the domain to the `idna.encode()` function it should no longer consume significant resources. This is triggered by arbitrarily large inputs that would not occur in normal usage, but may be passed to the library assuming there is no preliminary input validation by the higher-level application.\n\n### References\n* https://huntr.com/bounties/93d78d07-d791-4b39-a845-cbfabc44aadb",
"CVE-2024-31580": {
"description": "PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in the component /runtime/vararg_functions.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.",
"remediation": {
"recommendation": {
"text": "None Provided"
}
},
"score": 0.0,
"score_details": {},
"severity": "MEDIUM",
"source": "GITHUB",
"source_url": "https://github.com/advisories/GHSA-jjg7-2v4v-x38h",
"severity": "UNTRIAGED",
"source": "NVD",
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31580",
"status": "ACTIVE",
"title": "GHSA-jjg7-2v4v-x38h - idna",
"vulnerability_id": "GHSA-jjg7-2v4v-x38h",
"title": "CVE-2024-31580 - torch",
"vulnerability_id": "CVE-2024-31580",
"vulnerable_packages": [
{
"epoch": 0,
"filePath": "opt/conda/lib/python3.10/site-packages/idna-3.6.dist-info/METADATA",
"name": "idna",
"filePath": "opt/conda/lib/python3.10/site-packages/torch-1.13.1.dist-info/METADATA",
"name": "torch",
"packageManager": "PYTHONPKG",
"version": "3.6"
"version": "1.13.1"
}
]
},
"SNYK-PYTHON-IDNA-6597975": {
"description": "## Overview\n\nAffected versions of this package are vulnerable to Resource Exhaustion via the `idna.encode` function. An attacker can consume significant resources and potentially cause a denial-of-service by supplying specially crafted arguments to this function. \r\n\r\n**Note:**\r\nThis is triggered by arbitrarily large inputs that would not occur in normal usage but may be passed to the library assuming there is no preliminary input validation by the higher-level application.\n## Remediation\nUpgrade `idna` to version 3.7 or higher.\n## References\n- [GitHub Commit](https://github.com/kjd/idna/commit/5beb28b9dd77912c0dd656d8b0fdba3eb80222e7)",
"CVE-2024-31583": {
"description": "Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in torch/csrc/jit/mobile/interpreter.cpp.",
"remediation": {
"recommendation": {
"text": "None Provided"
}
},
"score": 6.2,
"score_details": {
"cvss": {
"adjustments": [],
"score": 6.2,
"scoreSource": "SNYK",
"scoringVector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"severity": "MEDIUM",
"source": "SNYK",
"source_url": "https://security.snyk.io/vuln/SNYK-PYTHON-IDNA-6597975",
"score": 0.0,
"score_details": {},
"severity": "UNTRIAGED",
"source": "NVD",
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31583",
"status": "ACTIVE",
"title": "IN1-PYTHON-IDNA-6597975 - idna",
"vulnerability_id": "SNYK-PYTHON-IDNA-6597975",
"title": "CVE-2024-31583 - torch",
"vulnerability_id": "CVE-2024-31583",
"vulnerable_packages": [
{
"epoch": 0,
"filePath": "opt/conda/lib/python3.10/site-packages/idna-3.6.dist-info/METADATA",
"name": "idna",
"filePath": "opt/conda/lib/python3.10/site-packages/torch-1.13.1.dist-info/METADATA",
"name": "torch",
"packageManager": "PYTHONPKG",
"version": "3.6"
"version": "1.13.1"
}
]
}
Expand Down
2 changes: 1 addition & 1 deletion docker/pytorch/inference/1.13.1/Dockerfile.neuronx
Original file line number Diff line number Diff line change
@@ -1,13 +1,13 @@
FROM public.ecr.aws/docker/library/ubuntu:20.04

LABEL dlc_major_version="1"

Check failure on line 3 in docker/pytorch/inference/1.13.1/Dockerfile.neuronx

View workflow job for this annotation

GitHub Actions / dockerfile-linter

DL3048 style: Invalid label key.
LABEL maintainer="Amazon AI"
LABEL com.amazonaws.sagemaker.capabilities.accept-bind-to-port=true

# Neuron SDK components version numbers
ARG NEURONX_FRAMEWORK_VERSION=1.13.1.1.14.0
ARG NEURONX_DISTRIBUTED_VERSION=0.7.0
ARG NEURONX_CC_VERSION=2.13.68.0
ARG NEURONX_CC_VERSION=2.13.72.0
ARG NEURONX_TRANSFORMERS_VERSION=0.10.0.360
ARG NEURONX_COLLECTIVES_LIB_VERSION=2.20.22.0-c101c322e
ARG NEURONX_RUNTIME_LIB_VERSION=2.20.22.0-1b3ca6425
Expand All @@ -26,7 +26,7 @@
ENV SAGEMAKER_SERVING_MODULE=sagemaker_pytorch_serving_container.serving:main
ENV TEMP=/home/model-server/tmp

RUN apt-get update \

Check failure on line 29 in docker/pytorch/inference/1.13.1/Dockerfile.neuronx

View workflow job for this annotation

GitHub Actions / dockerfile-linter

DL3008 warning: Pin versions in apt get install. Instead of `apt-get install <package>` use `apt-get install <package>=<version>`
&& apt-get upgrade -y \
&& apt-get install -y --no-install-recommends software-properties-common \
&& add-apt-repository ppa:openjdk-r/ppa \
Expand Down Expand Up @@ -57,9 +57,9 @@
&& apt-get clean

RUN echo "deb https://apt.repos.neuron.amazonaws.com focal main" > /etc/apt/sources.list.d/neuron.list
RUN wget -qO - https://apt.repos.neuron.amazonaws.com/GPG-PUB-KEY-AMAZON-AWS-NEURON.PUB | apt-key add -

Check failure on line 60 in docker/pytorch/inference/1.13.1/Dockerfile.neuronx

View workflow job for this annotation

GitHub Actions / dockerfile-linter

DL4006 warning: Set the SHELL option -o pipefail before RUN with a pipe in it. If you are using /bin/sh in an alpine image or if your shell is symlinked to busybox then consider explicitly setting your SHELL to /bin/ash, or disable this check

RUN apt-get update \

Check failure on line 62 in docker/pytorch/inference/1.13.1/Dockerfile.neuronx

View workflow job for this annotation

GitHub Actions / dockerfile-linter

DL3015 info: Avoid additional packages by specifying `--no-install-recommends`
&& apt-get install -y \
aws-neuronx-tools=$NEURONX_TOOLS_VERSION \
aws-neuronx-collectives=$NEURONX_COLLECTIVES_LIB_VERSION \
Expand All @@ -73,7 +73,7 @@
mv /etc/ssl/certs/java/cacerts.jks /etc/ssl/certs/java/cacerts; \
/var/lib/dpkg/info/ca-certificates-java.postinst configure;

RUN curl -L -o ~/mambaforge.sh https://github.com/conda-forge/miniforge/releases/download/${MAMBA_VERSION}/Mambaforge-${MAMBA_VERSION}-Linux-x86_64.sh \

Check failure on line 76 in docker/pytorch/inference/1.13.1/Dockerfile.neuronx

View workflow job for this annotation

GitHub Actions / dockerfile-linter

DL4001 warning: Either use Wget or Curl but not both
&& chmod +x ~/mambaforge.sh \
&& ~/mambaforge.sh -b -p /opt/conda \
&& rm ~/mambaforge.sh \
Expand All @@ -92,7 +92,7 @@

&& /opt/conda/bin/conda clean -ya

RUN conda install -c conda-forge \

Check failure on line 95 in docker/pytorch/inference/1.13.1/Dockerfile.neuronx

View workflow job for this annotation

GitHub Actions / dockerfile-linter

DL3013 warning: Pin versions in pip. Instead of `pip install <package>` use `pip install <package>==<version>` or `pip install --requirement <requirements file>`

Check failure on line 95 in docker/pytorch/inference/1.13.1/Dockerfile.neuronx

View workflow job for this annotation

GitHub Actions / dockerfile-linter

DL3042 warning: Avoid use of cache directory with pip. Use `pip install --no-cache-dir <package>`
scikit-learn \
h5py \
requests \
Expand All @@ -103,7 +103,7 @@
enum-compat \
ipython

RUN pip install --no-cache-dir -U \

Check failure on line 106 in docker/pytorch/inference/1.13.1/Dockerfile.neuronx

View workflow job for this annotation

GitHub Actions / dockerfile-linter

DL3013 warning: Pin versions in pip. Instead of `pip install <package>` use `pip install <package>==<version>` or `pip install --requirement <requirements file>`
opencv-python>=4.8.1.78 \
"numpy<1.24,>1.21" \
"scipy>=1.8.0" \
Expand All @@ -114,7 +114,7 @@
boto3 \
cryptography

RUN pip install -U --extra-index-url https://pip.repos.neuron.amazonaws.com \

Check failure on line 117 in docker/pytorch/inference/1.13.1/Dockerfile.neuronx

View workflow job for this annotation

GitHub Actions / dockerfile-linter

DL3042 warning: Avoid use of cache directory with pip. Use `pip install --no-cache-dir <package>`
neuronx-cc==$NEURONX_CC_VERSION \
torch-neuronx==$NEURONX_FRAMEWORK_VERSION \
transformers-neuronx==$NEURONX_TRANSFORMERS_VERSION \
Expand All @@ -141,7 +141,7 @@

RUN chmod +x /usr/local/bin/deep_learning_container.py

RUN pip install --no-cache-dir "sagemaker-pytorch-inference==${SM_TOOLKIT_VERSION}"

Check failure on line 144 in docker/pytorch/inference/1.13.1/Dockerfile.neuronx

View workflow job for this annotation

GitHub Actions / dockerfile-linter

DL3059 info: Multiple consecutive `RUN` instructions. Consider consolidation.

# patch default_pytorch_inference_handler.py to import torch_neuronx
RUN DEST_DIR=$(python -c "import os.path, sagemaker_pytorch_serving_container; print(os.path.dirname(sagemaker_pytorch_serving_container.__file__))") \
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,80 +12,72 @@
"source": "NVD",
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2511",
"status": "ACTIVE",
"title": "CVE-2024-2511 - pyOpenSSL, cryptography",
"title": "CVE-2024-2511 - cryptography, pyOpenSSL",
"vulnerability_id": "CVE-2024-2511",
"vulnerable_packages": [
{
"epoch": 0,
"filePath": "opt/conda/lib/python3.10/site-packages/pyOpenSSL-24.0.0.dist-info/METADATA",
"name": "pyOpenSSL",
"filePath": "opt/conda/lib/python3.10/site-packages/cryptography-42.0.5.dist-info/METADATA",
"name": "cryptography",
"packageManager": "PYTHONPKG",
"version": "24.0.0"
"version": "42.0.5"
},
{
"epoch": 0,
"filePath": "opt/conda/lib/python3.10/site-packages/cryptography-42.0.5.dist-info/METADATA",
"name": "cryptography",
"filePath": "opt/conda/lib/python3.10/site-packages/pyOpenSSL-24.0.0.dist-info/METADATA",
"name": "pyOpenSSL",
"packageManager": "PYTHONPKG",
"version": "42.0.5"
"version": "24.0.0"
}
]
},
"GHSA-jjg7-2v4v-x38h": {
"description": "### Impact\nA specially crafted argument to the `idna.encode()` function could consume significant resources. This may lead to a denial-of-service.\n\n### Patches\nThe function has been refined to reject such strings without the associated resource consumption in version 3.7.\n\n### Workarounds\nDomain names cannot exceed 253 characters in length, if this length limit is enforced prior to passing the domain to the `idna.encode()` function it should no longer consume significant resources. This is triggered by arbitrarily large inputs that would not occur in normal usage, but may be passed to the library assuming there is no preliminary input validation by the higher-level application.\n\n### References\n* https://huntr.com/bounties/93d78d07-d791-4b39-a845-cbfabc44aadb",
"CVE-2024-31580": {
"description": "PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in the component /runtime/vararg_functions.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.",
"remediation": {
"recommendation": {
"text": "None Provided"
}
},
"score": 0.0,
"score_details": {},
"severity": "MEDIUM",
"source": "GITHUB",
"source_url": "https://github.com/advisories/GHSA-jjg7-2v4v-x38h",
"severity": "UNTRIAGED",
"source": "NVD",
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31580",
"status": "ACTIVE",
"title": "GHSA-jjg7-2v4v-x38h - idna",
"vulnerability_id": "GHSA-jjg7-2v4v-x38h",
"title": "CVE-2024-31580 - torch",
"vulnerability_id": "CVE-2024-31580",
"vulnerable_packages": [
{
"epoch": 0,
"filePath": "opt/conda/lib/python3.10/site-packages/idna-3.6.dist-info/METADATA",
"name": "idna",
"filePath": "opt/conda/lib/python3.10/site-packages/torch-1.13.1.dist-info/METADATA",
"name": "torch",
"packageManager": "PYTHONPKG",
"version": "3.6"
"version": "1.13.1"
}
]
},
"SNYK-PYTHON-IDNA-6597975": {
"description": "## Overview\n\nAffected versions of this package are vulnerable to Resource Exhaustion via the `idna.encode` function. An attacker can consume significant resources and potentially cause a denial-of-service by supplying specially crafted arguments to this function. \r\n\r\n**Note:**\r\nThis is triggered by arbitrarily large inputs that would not occur in normal usage but may be passed to the library assuming there is no preliminary input validation by the higher-level application.\n## Remediation\nUpgrade `idna` to version 3.7 or higher.\n## References\n- [GitHub Commit](https://github.com/kjd/idna/commit/5beb28b9dd77912c0dd656d8b0fdba3eb80222e7)",
"CVE-2024-31583": {
"description": "Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in torch/csrc/jit/mobile/interpreter.cpp.",
"remediation": {
"recommendation": {
"text": "None Provided"
}
},
"score": 6.2,
"score_details": {
"cvss": {
"adjustments": [],
"score": 6.2,
"scoreSource": "SNYK",
"scoringVector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"severity": "MEDIUM",
"source": "SNYK",
"source_url": "https://security.snyk.io/vuln/SNYK-PYTHON-IDNA-6597975",
"score": 0.0,
"score_details": {},
"severity": "UNTRIAGED",
"source": "NVD",
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31583",
"status": "ACTIVE",
"title": "IN1-PYTHON-IDNA-6597975 - idna",
"vulnerability_id": "SNYK-PYTHON-IDNA-6597975",
"title": "CVE-2024-31583 - torch",
"vulnerability_id": "CVE-2024-31583",
"vulnerable_packages": [
{
"epoch": 0,
"filePath": "opt/conda/lib/python3.10/site-packages/idna-3.6.dist-info/METADATA",
"name": "idna",
"filePath": "opt/conda/lib/python3.10/site-packages/torch-1.13.1.dist-info/METADATA",
"name": "torch",
"packageManager": "PYTHONPKG",
"version": "3.6"
"version": "1.13.1"
}
]
}
Expand Down
2 changes: 1 addition & 1 deletion docker/pytorch/inference/2.1.2/Dockerfile.neuronx
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ LABEL com.amazonaws.sagemaker.capabilities.accept-bind-to-port=true

# Neuron SDK components version numbers
ARG NEURONX_DISTRIBUTED_VERSION=0.7.0
ARG NEURONX_CC_VERSION=2.13.68.0
ARG NEURONX_CC_VERSION=2.13.72.0
ARG NEURONX_FRAMEWORK_VERSION=2.1.2.2.1.0
ARG NEURONX_TRANSFORMERS_VERSION=0.10.0.360
ARG NEURONX_COLLECTIVES_LIB_VERSION=2.20.22.0-c101c322e
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,80 +12,72 @@
"source": "NVD",
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2511",
"status": "ACTIVE",
"title": "CVE-2024-2511 - cryptography, pyOpenSSL",
"title": "CVE-2024-2511 - pyOpenSSL, cryptography",
"vulnerability_id": "CVE-2024-2511",
"vulnerable_packages": [
{
"epoch": 0,
"filePath": "opt/conda/lib/python3.10/site-packages/cryptography-42.0.5.dist-info/METADATA",
"name": "cryptography",
"filePath": "opt/conda/lib/python3.10/site-packages/pyOpenSSL-24.0.0.dist-info/METADATA",
"name": "pyOpenSSL",
"packageManager": "PYTHONPKG",
"version": "42.0.5"
"version": "24.0.0"
},
{
"epoch": 0,
"filePath": "opt/conda/lib/python3.10/site-packages/pyOpenSSL-24.0.0.dist-info/METADATA",
"name": "pyOpenSSL",
"filePath": "opt/conda/lib/python3.10/site-packages/cryptography-42.0.5.dist-info/METADATA",
"name": "cryptography",
"packageManager": "PYTHONPKG",
"version": "24.0.0"
"version": "42.0.5"
}
]
},
"GHSA-jjg7-2v4v-x38h": {
"description": "### Impact\nA specially crafted argument to the `idna.encode()` function could consume significant resources. This may lead to a denial-of-service.\n\n### Patches\nThe function has been refined to reject such strings without the associated resource consumption in version 3.7.\n\n### Workarounds\nDomain names cannot exceed 253 characters in length, if this length limit is enforced prior to passing the domain to the `idna.encode()` function it should no longer consume significant resources. This is triggered by arbitrarily large inputs that would not occur in normal usage, but may be passed to the library assuming there is no preliminary input validation by the higher-level application.\n\n### References\n* https://huntr.com/bounties/93d78d07-d791-4b39-a845-cbfabc44aadb",
"CVE-2024-31580": {
"description": "PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in the component /runtime/vararg_functions.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.",
"remediation": {
"recommendation": {
"text": "None Provided"
}
},
"score": 0.0,
"score_details": {},
"severity": "MEDIUM",
"source": "GITHUB",
"source_url": "https://github.com/advisories/GHSA-jjg7-2v4v-x38h",
"severity": "UNTRIAGED",
"source": "NVD",
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31580",
"status": "ACTIVE",
"title": "GHSA-jjg7-2v4v-x38h - idna",
"vulnerability_id": "GHSA-jjg7-2v4v-x38h",
"title": "CVE-2024-31580 - torch",
"vulnerability_id": "CVE-2024-31580",
"vulnerable_packages": [
{
"epoch": 0,
"filePath": "opt/conda/lib/python3.10/site-packages/idna-3.6.dist-info/METADATA",
"name": "idna",
"filePath": "opt/conda/lib/python3.10/site-packages/torch-2.1.2.dist-info/METADATA",
"name": "torch",
"packageManager": "PYTHONPKG",
"version": "3.6"
"version": "2.1.2"
}
]
},
"SNYK-PYTHON-IDNA-6597975": {
"description": "## Overview\n\nAffected versions of this package are vulnerable to Resource Exhaustion via the `idna.encode` function. An attacker can consume significant resources and potentially cause a denial-of-service by supplying specially crafted arguments to this function. \r\n\r\n**Note:**\r\nThis is triggered by arbitrarily large inputs that would not occur in normal usage but may be passed to the library assuming there is no preliminary input validation by the higher-level application.\n## Remediation\nUpgrade `idna` to version 3.7 or higher.\n## References\n- [GitHub Commit](https://github.com/kjd/idna/commit/5beb28b9dd77912c0dd656d8b0fdba3eb80222e7)",
"CVE-2024-31583": {
"description": "Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in torch/csrc/jit/mobile/interpreter.cpp.",
"remediation": {
"recommendation": {
"text": "None Provided"
}
},
"score": 6.2,
"score_details": {
"cvss": {
"adjustments": [],
"score": 6.2,
"scoreSource": "SNYK",
"scoringVector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"severity": "MEDIUM",
"source": "SNYK",
"source_url": "https://security.snyk.io/vuln/SNYK-PYTHON-IDNA-6597975",
"score": 0.0,
"score_details": {},
"severity": "UNTRIAGED",
"source": "NVD",
"source_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31583",
"status": "ACTIVE",
"title": "IN1-PYTHON-IDNA-6597975 - idna",
"vulnerability_id": "SNYK-PYTHON-IDNA-6597975",
"title": "CVE-2024-31583 - torch",
"vulnerability_id": "CVE-2024-31583",
"vulnerable_packages": [
{
"epoch": 0,
"filePath": "opt/conda/lib/python3.10/site-packages/idna-3.6.dist-info/METADATA",
"name": "idna",
"filePath": "opt/conda/lib/python3.10/site-packages/torch-2.1.2.dist-info/METADATA",
"name": "torch",
"packageManager": "PYTHONPKG",
"version": "3.6"
"version": "2.1.2"
}
]
}
Expand Down
2 changes: 1 addition & 1 deletion docker/pytorch/training/1.13.1/Dockerfile.neuronx
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ LABEL dlc_major_version="1"
# Neuron SDK components version numbers
ARG NEURONX_FRAMEWORK_VERSION=1.13.1.1.14.0
ARG NEURONX_DISTRIBUTED_VERSION=0.7.0
ARG NEURONX_CC_VERSION=2.13.68.0
ARG NEURONX_CC_VERSION=2.13.72.0
ARG NEURONX_COLLECTIVES_LIB_VERSION=2.20.22.0-c101c322e
ARG NEURONX_RUNTIME_LIB_VERSION=2.20.22.0-1b3ca6425
ARG NEURONX_TOOLS_VERSION=2.17.1.0
Expand Down
Loading
Loading