Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Abhisheku/mmlab model selection #3692

Open
wants to merge 30 commits into
base: main
Choose a base branch
from

Conversation

abhishekMS2024
Copy link
Contributor

Update import_model component to support MMLab models.

Sample run:
MMLab_import_model

@abhishekMS2024 abhishekMS2024 requested a review from a team as a code owner December 18, 2024 09:29
roopavidhya
roopavidhya previously approved these changes Dec 18, 2024
Addi-11
Addi-11 previously approved these changes Dec 24, 2024
@abhishekMS2024 abhishekMS2024 marked this pull request as ready for review December 26, 2024 03:21
@vizhur vizhur removed the safe to publish Pull request containing new asset has been tested properly label Jan 7, 2025
Copy link
Contributor

@vizhur vizhur left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Those conda specs can't be a part of any AzureML asset

- python=3.9.19
- pip<=24.0
- pip:
- mlflow==2.12.1
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"vulnerabilities": [
    {
        "aliases": [
            "CVE-2024-37057"
        ],
        "details": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 2.0.0rc0 or newer, enabling a maliciously uploaded Tensorflow model to run arbitrary code on an end user’s system when interacted with.",
        "fixed_in": [],
        "id": "GHSA-j8mg-pqc5-x9gj",
        "link": "https://osv.dev/vulnerability/GHSA-j8mg-pqc5-x9gj",
        "source": "osv",
        "summary": null,
        "withdrawn": null
    },
    {
        "aliases": [
            "CVE-2024-37052"
        ],
        "details": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.1.0 or newer, enabling a maliciously uploaded scikit-learn model to run arbitrary code on an end user’s system when interacted with.",
        "fixed_in": [],
        "id": "GHSA-76cg-cfhx-373f",
        "link": "https://osv.dev/vulnerability/GHSA-76cg-cfhx-373f",
        "source": "osv",
        "summary": null,
        "withdrawn": null
    },
    {
        "aliases": [
            "CVE-2024-37053"
        ],
        "details": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.1.0 or newer, enabling a maliciously uploaded scikit-learn model to run arbitrary code on an end user’s system when interacted with.",
        "fixed_in": [],
        "id": "GHSA-43c4-9qgj-x742",
        "link": "https://osv.dev/vulnerability/GHSA-43c4-9qgj-x742",
        "source": "osv",
        "summary": null,
        "withdrawn": null
    },
    {
        "aliases": [
            "CVE-2024-37056"
        ],
        "details": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.23.0 or newer, enabling a maliciously uploaded LightGBM scikit-learn model to run arbitrary code on an end user’s system when interacted with.",
        "fixed_in": [],
        "id": "GHSA-7p8j-qv6x-f4g4",
        "link": "https://osv.dev/vulnerability/GHSA-7p8j-qv6x-f4g4",
        "source": "osv",
        "summary": null,
        "withdrawn": null
    },
    {
        "aliases": [
            "CVE-2024-37060"
        ],
        "details": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.27.0 or newer, enabling a maliciously crafted Recipe to execute arbitrary code on an end user’s system when run.",
        "fixed_in": [],
        "id": "GHSA-cv6c-7963-wxcg",
        "link": "https://osv.dev/vulnerability/GHSA-cv6c-7963-wxcg",
        "source": "osv",
        "summary": null,
        "withdrawn": null
    },
    {
        "aliases": [
            "CVE-2024-37055"
        ],
        "details": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.24.0 or newer, enabling a maliciously uploaded pmdarima model to run arbitrary code on an end user’s system when interacted with.",
        "fixed_in": [],
        "id": "GHSA-x38x-g6gr-jqff",
        "link": "https://osv.dev/vulnerability/GHSA-x38x-g6gr-jqff",
        "source": "osv",
        "summary": null,
        "withdrawn": null
    },
    {
        "aliases": [
            "CVE-2024-37054"
        ],
        "details": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 0.9.0 or newer, enabling a maliciously uploaded PyFunc model to run arbitrary code on an end user’s system when interacted with.",
        "fixed_in": [],
        "id": "GHSA-ghv6-9r9j-wh4j",
        "link": "https://osv.dev/vulnerability/GHSA-ghv6-9r9j-wh4j",
        "source": "osv",
        "summary": null,
        "withdrawn": null
    },
    {
        "aliases": [
            "CVE-2024-37058"
        ],
        "details": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 2.5.0 or newer, enabling a maliciously uploaded Langchain AgentExecutor model to run arbitrary code on an end user’s system when interacted with.",
        "fixed_in": [],
        "id": "GHSA-cwgg-w6mp-w9hg",
        "link": "https://osv.dev/vulnerability/GHSA-cwgg-w6mp-w9hg",
        "source": "osv",
        "summary": null,
        "withdrawn": null
    },
    {
        "aliases": [
            "CVE-2024-37061"
        ],
        "details": "Remote Code Execution can occur in versions of the MLflow platform running version 1.11.0 or newer, enabling a maliciously crafted MLproject to execute arbitrary code on an end user’s system when run due to unfiltered input.",
        "fixed_in": [],
        "id": "GHSA-pqcv-qw2r-r859",
        "link": "https://osv.dev/vulnerability/GHSA-pqcv-qw2r-r859",
        "source": "osv",
        "summary": null,
        "withdrawn": null
    },
    {
        "aliases": [
            "CVE-2024-37059"
        ],
        "details": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 0.5.0 or newer, enabling a maliciously uploaded PyTorch model to run arbitrary code on an end user’s system when interacted with.",
        "fixed_in": [],
        "id": "GHSA-wf7f-8fxf-xfxc",
        "link": "https://osv.dev/vulnerability/GHSA-wf7f-8fxf-xfxc",
        "source": "osv",
        "summary": null,
        "withdrawn": null
    },
    {
        "aliases": [
            "CVE-2024-27134"
        ],
        "details": "Excessive directory permissions in MLflow leads to local privilege escalation when using spark_udf. This behavior can be exploited by a local attacker to gain elevated permissions by using a ToCToU attack. The issue is only relevant when the spark_udf() MLflow API is called.",
        "fixed_in": [
            "2.16.0"
        ],
        "id": "GHSA-qpgc-w4mg-6v92",
        "link": "https://osv.dev/vulnerability/GHSA-qpgc-w4mg-6v92",
        "source": "osv",
        "summary": null,
        "withdrawn": null
    }
]

}

dependencies:
- python=3.9.19
- pip<=24.0
- pip:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

below is the list of vulnerabilities just for the first package https://pypi.org/pypi/mlflow/2.12.1/json

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants