|
34 | 34 | "reason": "Go net/url insufficient validation of bracketed IPv6 hostnames; present in NVIDIA CUDA base image Go tooling, not exposed by Lambda runtime.", |
35 | 35 | "review_by": "2026-03-24" |
36 | 36 | }, |
37 | | - { |
38 | | - "vulnerability_id": "CVE-2025-49794", |
39 | | - "reason": "libxml2 heap use-after-free DoS; fix not yet available in AL2023 repo.", |
40 | | - "review_by": "2026-03-24" |
41 | | - }, |
42 | | - { |
43 | | - "vulnerability_id": "CVE-2025-49795", |
44 | | - "reason": "libxml2 null pointer dereference DoS; fix not yet available in AL2023 repo.", |
45 | | - "review_by": "2026-03-24" |
46 | | - }, |
47 | | - { |
48 | | - "vulnerability_id": "CVE-2025-49796", |
49 | | - "reason": "libxml2 type confusion DoS; fix not yet available in AL2023 repo.", |
50 | | - "review_by": "2026-03-24" |
51 | | - }, |
52 | 37 | { |
53 | 38 | "vulnerability_id": "CVE-2025-58188", |
54 | 39 | "reason": "Go crypto/x509 panic on DSA public key certificates; present in NVIDIA CUDA base image Go tooling, not exposed by Lambda runtime.", |
55 | 40 | "review_by": "2026-03-24" |
56 | 41 | }, |
57 | | - { |
58 | | - "vulnerability_id": "CVE-2025-5914", |
59 | | - "reason": "libarchive out-of-bounds read in RAR seek; Lambda images do not extract untrusted RAR archives.", |
60 | | - "review_by": "2026-03-24" |
61 | | - }, |
62 | | - { |
63 | | - "vulnerability_id": "CVE-2025-59375", |
64 | | - "reason": "libexpat large dynamic allocation via small document; fix requires expat >= 2.7.2 not yet available in AL2023 repo.", |
65 | | - "review_by": "2026-03-24" |
66 | | - }, |
67 | | - { |
68 | | - "vulnerability_id": "CVE-2025-6021", |
69 | | - "reason": "libxml2 integer overflow in xmlBuildQName; fix not yet available in AL2023 repo.", |
70 | | - "review_by": "2026-03-24" |
71 | | - }, |
72 | | - { |
73 | | - "vulnerability_id": "CVE-2025-6052", |
74 | | - "reason": "glib GString memory management flaw on very large strings; fix not yet available in AL2023 repo.", |
75 | | - "review_by": "2026-03-24" |
76 | | - }, |
77 | | - { |
78 | | - "vulnerability_id": "CVE-2025-68973", |
79 | | - "reason": "GnuPG armor_filter double-increment OOB; fix requires GnuPG >= 2.4.9 not yet available in AL2023 repo.", |
80 | | - "review_by": "2026-03-24" |
81 | | - }, |
82 | | - { |
83 | | - "vulnerability_id": "CVE-2025-69421", |
84 | | - "reason": "OpenSSL PKCS#12 null pointer dereference; fix not yet available in AL2023 repo.", |
85 | | - "review_by": "2026-03-24" |
86 | | - }, |
87 | | - { |
88 | | - "vulnerability_id": "CVE-2025-7425", |
89 | | - "reason": "libxslt attribute type flag corruption; fix not yet available in AL2023 repo.", |
90 | | - "review_by": "2026-03-24" |
91 | | - }, |
92 | 42 | { |
93 | 43 | "vulnerability_id": "CVE-2025-8194", |
94 | 44 | "reason": "Python tarfile extraction API defect (stdlib); cannot be patched via pip. Lambda images do not extract untrusted tar archives at runtime.", |
|
99 | 49 | "reason": "urllib3 decompression bomb on redirect responses; pinned to urllib3==2.6.3 in requirements files but ECR scan may still report against bundled copies in transitive deps.", |
100 | 50 | "review_by": "2026-03-24" |
101 | 51 | }, |
102 | | - { |
103 | | - "vulnerability_id": "CVE-2026-22796", |
104 | | - "reason": "OpenSSL ASN1_TYPE type confusion in PKCS7_digest_from_attributes; fix not yet available in AL2023 repo.", |
105 | | - "review_by": "2026-03-24" |
106 | | - }, |
107 | 52 | { |
108 | 53 | "vulnerability_id": "CVE-2026-23949", |
109 | 54 | "reason": "CVE details not yet published; present in NVIDIA CUDA base image, no fix available in AL2023 repo.", |
|
0 commit comments