Closed kropiwnickij closed 3 days ago
These are refreshed weekly, so I suspect something has gone amiss here - @d3r3kk to triage.
Hello @kropiwnickij thank you for the report.
Please do note that the vulnerabilities you have discovered are handled by the Mariner team and not by the OpenJDK team. As @karianna said above, the OpenJDK team refreshes our images weekly to ensure we pick up the latest fixes from the Mariner team. Unless a vulnerability pertains to the OpenJDK itself, or any of its dependencies, we must pass the issue on to the Mariner team.
To be thorough and to learn myself what the concerns were and how to resolve them, I found the following that you may find helpful.
krb5
VulnerabilityFor krb5
the link you gave us for the vulnerability being fixed says (at the top):
"Reverted" krb5 1.21.3 to 1.19.4. Epoch bumped for "upgrade" continuity (that is 1.21.3 upgrades to 1.19.4). This change was to resolve an issue with krb5 where powershell's ssh woiuld hang during authentication. These CVE's were also patched in the 1.19.4 version https://github.com/advisories/GHSA-8wpj-v5qv-3wf4 and https://github.com/advisories/GHSA-wvrw-2fv8-cjvx. Note that these were also fixed in the 1.21.3 version. (Note the 1.19.4 patches were applied)
...and then lower down, the line:
Patch krb5 to fix https://github.com/advisories/GHSA-qp5h-mm28-4jq3 and https://github.com/advisories/GHSA-jc8v-q399-gfq9
tells me that the CVEs mentioned above are actually fixed in the Mariner repository.
To be certain, doing tdnf info krb5 --installed
in a running 21-mariner container results in showing:
root [ / ]# tdnf info krb5 --installed
Loaded plugin: tdnfrepogpgcheck
Name : krb5
Arch : x86_64
Epoch : 0
Version : 1.19.4
Release : 3.cm2
Install Size : 3.32M (3485624)
Repo : @System
Summary : The Kerberos newtork authentication system
URL : https://web.mit.edu/kerberos/
License : MIT
Description : Kerberos V5 is a trusted-third-party network authentication system,
which can improve your network's security by eliminating the insecure
practice of clear text passwords.
Total Size: 3.32M (3485624)
curl
VulnerabilityFixed here: https://github.com/microsoft/azurelinux/pull/10731 Installed as of this morning:
root [ / ]# tdnf info curl --installed
Loaded plugin: tdnfrepogpgcheck
Name : curl
Arch : x86_64
Epoch : 0
Version : 8.8.0
Release : 3.cm2
Install Size : 360.37k (369023)
Repo : @System
Summary : An URL retrieval utility and library
URL : https://curl.haxx.se
License : curl
Description : The cURL package contains an utility and a library used for
transferring files with URL syntax to any of the following
protocols: FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET,
DICT, LDAP, LDAPS and FILE. Its ability to both download and
upload files can be incorporated into other programs to support
functions like streaming media.
Total Size: 360.37k (369023)
nghttp2
VulnerabilityFixed here: https://github.com/microsoft/azurelinux/pull/10656 Installed as of this morning:
root [ / ]# tdnf info nghttp2 --installed
Loaded plugin: tdnfrepogpgcheck
Name : nghttp2
Arch : x86_64
Epoch : 0
Version : 1.57.0
Release : 2.cm2
Install Size : 285.78k (292641)
Repo : @System
Summary : nghttp2 is an implementation of HTTP/2 and its header compression algorithm, HPACK.
URL : https://nghttp2.org
License : MIT
Description : Implementation of the Hypertext Transfer Protocol version 2 in C.
Total Size: 285.78k (292641)
@d3r3kk that you for explanation.
Looking at one of CVE seems that it was solved in 1.19.4 patch in mariner, but as per NVD newer one as 1.21.3 is expected - this causes incorrect scan results.
As first report shows: 1.19.4-3.cm2 | fixed in 1.21.3-1
How do you propose to approach this case? Should this be reported to Mariner team to upgrade to latest krb version?
Regards Jan
@kropiwnickij, thanks for your attention.
How do you propose to approach this case? Should this be reported to Mariner team to upgrade to latest krb version?
Yes, if it doesn't pertain directly to the OpenJDK itself, or the tools, libraries, and direct dependencies it adds to the image, then it goes to the Mariner team.
Hi Team,
When running container image scans for latest jdk:21-mariner (latest as per https://mcr.microsoft.com/en-us/artifact/mar/openjdk/jdk/tags) we are seeing Critical and High vulnerabilities:
I checked that in azurelinux they were fixed in releases: https://github.com/microsoft/azurelinux/releases/tag/2.0.20241006-2.0 and https://github.com/microsoft/azurelinux/releases/tag/3.0.20240824-3.0
Is there a timeline when we can expect jdk mariner images to be refreshed and released?
Regards Jan