Fix Pillow CVE in foundation-model-serve environment (bump to 12.2.0)#4951
Fix Pillow CVE in foundation-model-serve environment (bump to 12.2.0)#4951
Conversation
Agent-Logs-Url: https://github.com/Azure/azureml-assets/sessions/25f4554b-8cb7-4108-ad5d-fae93a40ef9b Co-authored-by: pabhatia-ms <189966490+pabhatia-ms@users.noreply.github.com>
Test Results for assets-test0 tests 0 ✅ 0s ⏱️ Results for commit 90a32e6. ♻️ This comment has been updated with latest results. |
|
@vizhur can you provide thumsup for this. I have a quick query, these scan changes are againts gh advisory db, once we publish this to registry is this DB synced with CVE in the registry vulnerability scans ? |
Agent-Logs-Url: https://github.com/Azure/azureml-assets/sessions/dbe2b4d6-8ec4-4d15-8ba7-90bf24387025 Co-authored-by: pabhatia-ms <189966490+pabhatia-ms@users.noreply.github.com>
Agent-Logs-Url: https://github.com/Azure/azureml-assets/sessions/5c4c657b-1257-4469-afd0-0de100f65634 Co-authored-by: pabhatia-ms <189966490+pabhatia-ms@users.noreply.github.com>
Agent-Logs-Url: https://github.com/Azure/azureml-assets/sessions/703b31b1-bb1f-4268-9b88-e7ebc0e90742 Co-authored-by: pabhatia-ms <189966490+pabhatia-ms@users.noreply.github.com>
vizhur
left a comment
There was a problem hiding this comment.
can't the same be achieved with unpinned dependencies? is there a validation if dependencies are compatible? what about nested dependencies
…tagged PR Agent-Logs-Url: https://github.com/Azure/azureml-assets/sessions/1eb3495b-7847-45e8-81fa-2488cf19075b Co-authored-by: pabhatia-ms <189966490+pabhatia-ms@users.noreply.github.com>
Agent-Logs-Url: https://github.com/Azure/azureml-assets/sessions/1eb3495b-7847-45e8-81fa-2488cf19075b Co-authored-by: pabhatia-ms <189966490+pabhatia-ms@users.noreply.github.com>
@vizhur keeping the pinned version I see will help:
|
|
I don't see a value of the pipeline. Pinning changes can go through. You may want to create a pipeline/agent outside of this repo, that would get the findings for the latest image, build context from release branch, confirm the fix is actually needed. Build an image with proposed changes, check for vulnerabilities using our internal tool, issue a PR. |
Close remediation loop: transitive fixes, build-break repair, single tagged PR
scripts/environment/resolve_and_audit.pyhelper — resolves transitive set, audits, classifies intoparent_bump/transitive_pin/residual, surfacesResolutionImpossible. Semver-aware minimum-fix selection (viapackaging.version.Version). Passes flake8, pydocstyle, and the repo's own validators.fm-serve-vuln-audit.yaml:workflow_dispatchinputsrepair_mode(build-break / post-scan) andrepair_attempt; runaway-cap guard.# CVE-xxxx transitive pin; drop when …markers.reasoning.mdnow includes Residuals, resolver-conflict, repair-pass, and merge-gate sections; newtransitive-summary.jsonartifact;security/auto-remediationlabel; stableauto/fm-serve-vuln-auditbranch (no delete-branch).fm-serve-vuln-audit-postbuild.yaml:ems-scanruns only on CI success; emitssummary.json(totals +fixable_severe); Trivy column labelled "Fixed (suggested)"; merge-gate line added.post-scanrepair mode against the same branch.repair-on-failurejob: fires onenvironments-cifailure on an auto branch, counts prior 24h repair-pass runs, dispatchesbuild-breakrepair or posts a "cap reached"@-mention to the reviewer.actions: writepermission to allow workflow dispatch.packaging.version.Versionfor minimum-fix selection somin("2.0.0", "10.0.0")picks2.0.0(covered by a smoke test).