Skip to content

Commit 0c1933f

Browse files
committed
fix: remove 11 more OS CVEs now resolved by --releasever latest
With --releasever latest, dnf upgrade --security now picks up fixes for libxml2, glib2, expat, libarchive, gnupg2, openssl, and libxslt CVEs. Reduces allowlist from 25 to 14 entries. Remaining entries are Python stdlib (tarfile), bundled setuptools/ urllib3, NVIDIA CUDA base image Go tooling, and unpublished CVEs that cannot be resolved via OS package updates. Signed-off-by: Junpu Fan <junpu@amazon.com>
1 parent 9bd2c20 commit 0c1933f

File tree

1 file changed

+0
-55
lines changed

1 file changed

+0
-55
lines changed

test/security/data/ecr_scan_allowlist/lambda/framework_allowlist.json

Lines changed: 0 additions & 55 deletions
Original file line numberDiff line numberDiff line change
@@ -34,61 +34,11 @@
3434
"reason": "Go net/url insufficient validation of bracketed IPv6 hostnames; present in NVIDIA CUDA base image Go tooling, not exposed by Lambda runtime.",
3535
"review_by": "2026-03-24"
3636
},
37-
{
38-
"vulnerability_id": "CVE-2025-49794",
39-
"reason": "libxml2 heap use-after-free DoS; fix not yet available in AL2023 repo.",
40-
"review_by": "2026-03-24"
41-
},
42-
{
43-
"vulnerability_id": "CVE-2025-49795",
44-
"reason": "libxml2 null pointer dereference DoS; fix not yet available in AL2023 repo.",
45-
"review_by": "2026-03-24"
46-
},
47-
{
48-
"vulnerability_id": "CVE-2025-49796",
49-
"reason": "libxml2 type confusion DoS; fix not yet available in AL2023 repo.",
50-
"review_by": "2026-03-24"
51-
},
5237
{
5338
"vulnerability_id": "CVE-2025-58188",
5439
"reason": "Go crypto/x509 panic on DSA public key certificates; present in NVIDIA CUDA base image Go tooling, not exposed by Lambda runtime.",
5540
"review_by": "2026-03-24"
5641
},
57-
{
58-
"vulnerability_id": "CVE-2025-5914",
59-
"reason": "libarchive out-of-bounds read in RAR seek; Lambda images do not extract untrusted RAR archives.",
60-
"review_by": "2026-03-24"
61-
},
62-
{
63-
"vulnerability_id": "CVE-2025-59375",
64-
"reason": "libexpat large dynamic allocation via small document; fix requires expat >= 2.7.2 not yet available in AL2023 repo.",
65-
"review_by": "2026-03-24"
66-
},
67-
{
68-
"vulnerability_id": "CVE-2025-6021",
69-
"reason": "libxml2 integer overflow in xmlBuildQName; fix not yet available in AL2023 repo.",
70-
"review_by": "2026-03-24"
71-
},
72-
{
73-
"vulnerability_id": "CVE-2025-6052",
74-
"reason": "glib GString memory management flaw on very large strings; fix not yet available in AL2023 repo.",
75-
"review_by": "2026-03-24"
76-
},
77-
{
78-
"vulnerability_id": "CVE-2025-68973",
79-
"reason": "GnuPG armor_filter double-increment OOB; fix requires GnuPG >= 2.4.9 not yet available in AL2023 repo.",
80-
"review_by": "2026-03-24"
81-
},
82-
{
83-
"vulnerability_id": "CVE-2025-69421",
84-
"reason": "OpenSSL PKCS#12 null pointer dereference; fix not yet available in AL2023 repo.",
85-
"review_by": "2026-03-24"
86-
},
87-
{
88-
"vulnerability_id": "CVE-2025-7425",
89-
"reason": "libxslt attribute type flag corruption; fix not yet available in AL2023 repo.",
90-
"review_by": "2026-03-24"
91-
},
9242
{
9343
"vulnerability_id": "CVE-2025-8194",
9444
"reason": "Python tarfile extraction API defect (stdlib); cannot be patched via pip. Lambda images do not extract untrusted tar archives at runtime.",
@@ -99,11 +49,6 @@
9949
"reason": "urllib3 decompression bomb on redirect responses; pinned to urllib3==2.6.3 in requirements files but ECR scan may still report against bundled copies in transitive deps.",
10050
"review_by": "2026-03-24"
10151
},
102-
{
103-
"vulnerability_id": "CVE-2026-22796",
104-
"reason": "OpenSSL ASN1_TYPE type confusion in PKCS7_digest_from_attributes; fix not yet available in AL2023 repo.",
105-
"review_by": "2026-03-24"
106-
},
10752
{
10853
"vulnerability_id": "CVE-2026-23949",
10954
"reason": "CVE details not yet published; present in NVIDIA CUDA base image, no fix available in AL2023 repo.",

0 commit comments

Comments
 (0)