今回使用したAMIは「Windows_Server-2022-English-Full-Base-2026.03.11」です。同じAMIでなくとも、Windows Server 2022であれば問題ないかと思います。
ADの設定は、以下のページの設定内容をほぼそのまま真似させていただきました。変更したところといえば、ルートドメイン名を「ad.dify-test-domain.local」にしたくらいでしょうか。
master.dify-test-tk-redis-01.xxxxxxxxxxx.cache.amazonaws.com:6379> AUTH oPpjxxxxxxxxxxxxxxxxxxxxxxxZD0
OK
master.dify-test-tk-redis-01.xxxxxxxxxxx.cache.amazonaws.com:6379>
{"recordId": "CVE-2025-27363", "modelInput": {"anthropic_version": "bedrock-2023-05-31", "max_tokens": 4096, "temperature": 0.1, "system": "あなたはセキュリティの専門家です。以下の脆弱性情報について解説してください。どのような場合に特にリスクが高まるのか、具体的にどのような被害が発生する可能性があるのか知りたいです。解説は、LPICやLinuCのレベル1~2くらいの知識がある人が理解できるような内容にしてください。", "messages": [{"role": "user", "content": "{\"cve\": {\"id\": \"CVE-2025-27363\", \"sourceIdentifier\": \"cve-assign@fb.com\", \"published\": \"2025-03-11T14:15:25.427\", \"lastModified\": \"2025-10-27T17:06:41.997\", \"vulnStatus\": \"Analyzed\", \"cveTags\": [], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.\"}, {\"lang\": \"es\", \"value\": \"Existe una escritura fuera de los límites en las versiones 2.13.0 y anteriores de FreeType al intentar analizar estructuras de subglifos de fuentes relacionadas con archivos de fuentes TrueType GX y variables. El código vulnerable asigna un valor short con signo a un long sin signo y luego añade un valor estático, lo que provoca un bucle y asigna un búfer de montón demasiado pequeño. El código escribe entonces hasta 6 enteros long con signo fuera de los límites en relación con este búfer. Esto puede provocar la ejecución de código arbitrario. Esta vulnerabilidad podría haber sido explotada in situ.\"}], \"metrics\": {\"cvssMetricV31\": [{\"source\": \"cve-assign@fb.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.1, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.1, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 5.9}]}, \"cisaExploitAdd\": \"2025-05-06\", \"cisaActionDue\": \"2025-05-27\", \"cisaRequiredAction\": \"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\", \"cisaVulnerabilityName\": \"FreeType Out-of-Bounds Write Vulnerability\", \"weaknesses\": [{\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-787\"}]}], \"configurations\": [{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.13.0\", \"matchCriteriaId\": \"47088474-E5B5-4220-8F12-D664F2DED5C1\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}], \"references\": [{\"url\": \"https://www.facebook.com/security/advisories/cve-2025-27363\", \"source\": \"cve-assign@fb.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/03/13/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/03/13/11\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/03/13/12\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/03/13/2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/03/13/3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/03/13/8\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/03/14/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/03/14/2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/03/14/3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/03/14/4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/05/06/3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2025/03/msg00030.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://source.android.com/docs/security/bulletin/2025-05-01\", \"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-27363\", \"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"tags\": [\"US Government Resource\"]}]}}"}]}}
$ uv run run_batch_job.py
Traceback (most recent call last):
(一部省略)
botocore.errorfactory.AccessDeniedException: An error occurred (AccessDeniedException) when calling the CreateModelInvocationJob operation: Your account currently does not have access to this model. Model access setup is in progress. Please try again in 2 minutes.