This document is relevant for: Inf1, Inf2, Trn1, Trn2, Trn3

Neuron DLC Release Notes#

Note

For Neuron DLC release notes on Neuron 2.25.0 up to the current release, see Neuron Containers - Prior Release Notes.


Known Issues#

Note: Common Vulnerability and Exposure (CVE) identifiers are assigned to publicly disclosed cybersecurity vulnerabilities. CVE identifiers help security professionals and software vendors coordinate their efforts to address and mitigate vulnerabilities.

  • pytorch-training-neuronx: 0.9.0 DLC has multiple CRITICAL and HIGH CVEs. We are actively working to resolve them.
    • CVE-2021-44906 - Prototype Pollution vulnerability in minimist package

    • CVE-2023-38039 - Memory exhaustion vulnerability in curl/libcurl from unlimited header processing

    • CVE-2021-35517 - Denial of service vulnerability in Apache Commons Compress TAR archive processing

    • CVE-2022-29217 - JWT signing algorithm confusion vulnerability in PyJWT library

    • CVE-2025-58056 - HTTP request smuggling vulnerability in Netty codec

    • CVE-2024-45337 - Authorization bypass vulnerability in golang.org/x/crypto SSH implementation

    • CVE-2024-56201 - Remote code execution vulnerability in Jinja templating engine

    • CVE-2025-0725 - Buffer overflow vulnerability in curl/libcurl gzip decompression

    • CVE-2023-36665 - Prototype Pollution vulnerability in protobufjs library

    • CVE-2023-45288 - HTTP/2 CONTINUATION frame DoS vulnerability in golang.org/x/net

    • CVE-2021-33194 - Infinite loop vulnerability in golang.org/x/net ParseFragment

    • CVE-2023-41419 - Privilege escalation vulnerability in gevent WSGIServer

    • CVE-2021-35516 - Memory exhaustion vulnerability in Apache Commons Compress 7Z processing

    • CVE-2022-24771 - RSA signature verification vulnerability in node-forge

    • CVE-2022-41723 - HTTP/2 HPACK decoder DoS vulnerability in golang.org/x/net

    • CVE-2025-66031 - Uncontrolled recursion DoS vulnerability in node-forge ASN.1 parsing

    • CVE-2025-58057 - Memory exhaustion vulnerability in Netty BrotliDecoder

    • CVE-2023-50782 - TLS RSA key exchange vulnerability in python-cryptography

    • CVE-2022-24772 - RSA signature verification vulnerability in node-forge DigestInfo

    • CVE-2022-27664 - HTTP/2 connection hang DoS vulnerability in golang.org/x/net

    • CVE-2024-56326 - Sandbox bypass vulnerability in Jinja str.format detection

    • CVE-2024-3651 - Quadratic complexity DoS vulnerability in idna.encode() function

    • CVE-2023-49083 - NULL-pointer dereference vulnerability in cryptography PKCS7 processing

    • CVE-2024-22189 - Memory exhaustion vulnerability in quic-go NEW_CONNECTION_ID frames

    • CVE-2025-47273 - Path traversal vulnerability in setuptools PackageIndex

    • CVE-2025-66418 - Unbounded decompression chain vulnerability in urllib3

    • CVE-2021-23337 - Command injection vulnerability in lodash template function

    • CVE-2023-29824 - Use-after-free vulnerability in SciPy Py_FindObjects() function

    • CVE-2025-12816 - ASN.1 schema validation bypass vulnerability in node-forge

    • CVE-2025-22869 - SSH file transfer DoS vulnerability in golang.org/x/crypto

    • CVE-2025-59530 - HANDSHAKE_DONE frame DoS vulnerability in quic-go

    • CVE-2024-6345 - Remote code execution vulnerability in setuptools package_index

    • CVE-2023-27533 - TELNET protocol input validation vulnerability in curl/libcurl

    • CVE-2021-36090 - Memory exhaustion vulnerability in Apache Commons Compress ZIP processing

    • CVE-2025-66471 - Highly compressed data handling vulnerability in urllib3 Streaming API

    • CVE-2023-43804 - Cookie header information leak vulnerability in urllib3 redirects

    • CVE-2022-25878 - Prototype Pollution vulnerability in protobufjs util.setProperty

    • CVE-2021-35515 - Infinite loop vulnerability in Apache Commons Compress 7Z codec construction

    • CVE-2021-38561 - Out-of-bounds read vulnerability in golang.org/x/text BCP 47 parsing

    • CVE-2022-43551 - HSTS bypass vulnerability in curl/libcurl IDN handling

    • CVE-2022-27191 - SSH server crash vulnerability in golang.org/x/crypto AddHostKey

    • GHSA-m425-mq94-257g - HTTP/2 concurrent stream limit bypass vulnerability in gRPC-Go

    • CVE-2023-39325 - HTTP/2 request reset DoS vulnerability in golang.org/x/net

    • CVE-2024-2398 - Memory leak vulnerability in curl/libcurl HTTP/2 server push

    • CVE-2023-44487 - HTTP/2 Rapid Reset DoS vulnerability in multiple packages

    • CVE-2025-55163 - MadeYouReset DDoS vulnerability in Netty HTTP/2 implementation

    • CVE-2023-27534 - SFTP path traversal vulnerability in curl/libcurl tilde handling

    • CVE-2022-32149 - Accept-Language header DoS vulnerability in golang.org/x/text

    • CVE-2025-47913 - SSH agent panic vulnerability in golang.org/x/crypto

    • CVE-2022-40898 - DoS vulnerability in Python wheel CLI

    • CVE-2023-23914 - HSTS functionality failure vulnerability in curl/libcurl

    • CVE-2023-0286 - X.400 address processing vulnerability in cryptography

    • CVE-2022-25647 - Deserialization vulnerability in Gson writeReplace() method

    • CVE-2021-43565 - SSH server panic vulnerability in golang.org/x/crypto

    • CVE-2024-7254 - Stack overflow vulnerability in Protocol Buffers nested groups parsing

    • CVE-2023-2976 - Temporary directory access vulnerability in Google Guava FileBackedOutputStream

    • CVE-2026-21441 - Decompression bomb vulnerability in urllib3 HTTP redirect responses

    • CVE-2023-38545 - Heap buffer overflow vulnerability in curl/libcurl SOCKS5 proxy handshake

    • GHSA-xpw8-rcwv-8f8p - HTTP/2 RST frame DoS vulnerability in Netty

    • CVE-2022-42920 - Arbitrary bytecode generation vulnerability in Apache Commons BCEL

    • CVE-2024-24786 - Infinite loop vulnerability in google.golang.org/protobuf JSON unmarshaling

  • pytorch-inference-vllm-neuronx: 0.11.0 DLC has multiple HIGH CVEs. We are actively working to resolve these high CVEs:
    • CVE-2026-21441 - Decompression bomb vulnerability in urllib3 HTTP redirect responses

    • CVE-2025-62164 - Memory corruption vulnerability in vLLM Completions API endpoint

    • CVE-2025-69223 - Zip bomb DoS vulnerability in AIOHTTP server

    • GHSA-mcmc-2m55-j8jj - Insufficient fix for CVE-2025-62164 in vLLM sparse tensor validation

    • CVE-2025-66448 - Remote code execution vulnerability in vLLM config class auto_map

    • CVE-2025-66418 - Unbounded decompression chain vulnerability in urllib3

    • CVE-2025-66471 - Highly compressed data handling vulnerability in urllib3 Streaming API

  • pytorch-training-neuronx: 0.9.0 DLC has multiple HIGH CVEs. We are actively working to resolve these high CVEs:
    • CVE-2025-66418 - Unbounded decompression chain vulnerability in urllib3

    • CVE-2025-66471 - Highly compressed data handling vulnerability in urllib3 Streaming API

    • CVE-2026-21441 - Decompression bomb vulnerability in urllib3 HTTP redirect responses

Neuron 2.26.0#

Date: 6/24/2025

  • pytorch-training-neuronx 2.7.0 DLC has two HIGH CVEs related to sagemaker-python-sdk package. We are actively working to resolve these high CVEs:

Neuron 2.24.0#

Date: 06/24/2025

  • Added new pytorch-inference-vllm-neuronx 0.7.2 DLC that contains all dependencies including drivers, tools, NxDI and other packages to run vLLM out of the box

  • Upgraded pytorch-training-neuronx DLC to 2.7 version along with its related dependencies

  • Upgraded pytorch-inference-neuronx DLC to 2.7 version along with its related dependencies

  • Upgraded jax-training-neuronx DLC to 0.6 version along with its related dependencies

  • Updated Neuron SDK to latest 2.24.0 release for all Neuron DLCs

Neuron 2.23.0#

Date: 05/19/2025

  • Upgraded pytorch-training-neuronx DLC to 2.6 version along with its related dependencies

  • Upgraded pytorch-inference-neuronx DLC to 2.6 version along with its related dependencies

  • Updated Neuron SDK to latest 2.23.0 release for all Neuron DLCs

Neuron 2.22.0#

Date: 04/04/2025

  • Upgraded jax-training-neuronx DLC to 0.5 version

  • Updated Neuron SDK to latest 2.22.0 release for all Neuron DLCs

  • Restructure all Dockerfiles by combining RUN commands for faster build time

Neuron 2.21.1#

Date: 01/14/2025

  • Minor improvements and bug fixes.

Neuron 2.21.0#

Date: 12/19/2024

  • Added new jax-training-neuronx 0.4 Training DLC that contains all dependencies including drivers, tools and other packages to run JAX out of the box.

  • Added new pytorch-inference-neuronx 2.5.1 and pytorch-training-neuronx 2.5.1 DLCs

  • PyTorch 1.13.1 and 2.1.2 DLCs reached end of support phase, We now recommend customers to use PyTorch 2.5.1 DLCs by default.

  • All Neuron supported DLCs to use latest Neuron SDK 2.21.0 version.

  • All Neuron supported DLCs are now updated to Ubuntu 22. Here is the list:

    • pytorch-inference-neuron 2.5.1 with Ubuntu 22

    • pytorch-training-neuron 2.5.1 with Ubuntu 22

    • jax-training-neuronx 0.4 with Ubuntu 22

  • pytorch-inference-neuronx now supports both NxD Inference and Transformers NeuronX libraries for inference.

Neuron 2.20.2#

Date: 11/20/2024

  • Neuron 2.20.2 DLC fixes dependency bug for NxDT use case by pinning the correct torch version.

Neuron 2.20.1#

Date: 10/25/2024

  • Neuron 2.20.1 DLC includes prerequisites for Setup. Customers can expect to use NxDT out of the box.

Neuron 2.20.0#

Date: 09/16/2024

  • Updated Neuron SDK to latest 2.20.0 release for PyTorch Neuron DLCs.

  • Added new NxD Training package to pytorch-training-neuronx DLCs.

  • See here for the new DLC details.

Neuron 2.19.0#

Date: 07/03/2024

  • Updated Neuron SDK to latest 2.19.0 release for PyTorch Neuron DLCs.

  • Updated TorchServe to 0.11.0 for PyTorch Neuron DLCs.

  • See here for the new DLC details.

This document is relevant for: Inf1, Inf2, Trn1, Trn2, Trn3