You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
fix: remove pip from Lambda GPU runtime images to eliminate bundled CVEs
Install awslambdaric via uv instead of inheriting it from the Lambda
base image. Copy only Python binary/stdlib/lib from lambda-python stage,
drop site-packages entirely, and install all deps (including
awslambdaric==3.1.1 and pip==25.3) via uv so we own the full dependency
tree. Remove pip after OSS compliance step runs.
This eliminates the three pip-bundled CVEs that could not be patched via
requirements pinning:
- CVE-2024-6345 (setuptools RCE via pip/_vendor/pkg_resources)
- CVE-2025-47273 (setuptools path traversal via pip/_vendor/pkg_resources)
- CVE-2026-21441 (urllib3 decompression bomb via pip/_vendor/urllib3==1.26.20)
Allowlist reduced from 14 to 11 entries.
Signed-off-by: Junpu Fan <junpu@amazon.com>
Copy file name to clipboardExpand all lines: test/security/data/ecr_scan_allowlist/lambda/framework_allowlist.json
+3-15Lines changed: 3 additions & 15 deletions
Original file line number
Diff line number
Diff line change
@@ -1,9 +1,5 @@
1
1
[
2
-
{
3
-
"vulnerability_id": "CVE-2024-6345",
4
-
"reason": "setuptools package_index RCE; pinned to setuptools==78.1.1 in requirements but ECR scan detects older copy bundled in uv or the Lambda base image's pip, which cannot be patched via requirements.",
5
-
"review_by": "2026-03-24"
6
-
},
2
+
7
3
{
8
4
"vulnerability_id": "CVE-2025-4138",
9
5
"reason": "Python tarfile symlink extraction filter bypass (stdlib); cannot be patched via pip. Lambda images do not extract untrusted tar archives at runtime.",
@@ -24,11 +20,7 @@
24
20
"reason": "Python tarfile arbitrary write with filter=data (stdlib); cannot be patched via pip. Lambda images do not extract untrusted tar archives at runtime.",
25
21
"review_by": "2026-03-24"
26
22
},
27
-
{
28
-
"vulnerability_id": "CVE-2025-47273",
29
-
"reason": "setuptools path traversal; pinned to setuptools==78.1.1 in requirements but ECR scan detects older copy bundled in uv or the Lambda base image's pip, which cannot be patched via requirements.",
30
-
"review_by": "2026-03-24"
31
-
},
23
+
32
24
{
33
25
"vulnerability_id": "CVE-2025-47912",
34
26
"reason": "Go net/url insufficient validation of bracketed IPv6 hostnames; present in NVIDIA CUDA base image Go tooling, not exposed by Lambda runtime.",
@@ -44,11 +36,7 @@
44
36
"reason": "Python tarfile extraction API defect (stdlib); cannot be patched via pip. Lambda images do not extract untrusted tar archives at runtime.",
45
37
"review_by": "2026-03-24"
46
38
},
47
-
{
48
-
"vulnerability_id": "CVE-2026-21441",
49
-
"reason": "urllib3 decompression bomb on redirect responses; pinned to urllib3==2.6.3 in requirements files but ECR scan may still report against bundled copies in transitive deps.",
50
-
"review_by": "2026-03-24"
51
-
},
39
+
52
40
{
53
41
"vulnerability_id": "CVE-2026-23949",
54
42
"reason": "CVE details not yet published; present in NVIDIA CUDA base image, no fix available in AL2023 repo.",
0 commit comments