Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2024-5535 vulnerability #405

Open
hishamanver opened this issue Jul 5, 2024 · 12 comments
Open

CVE-2024-5535 vulnerability #405

hishamanver opened this issue Jul 5, 2024 · 12 comments

Comments

@hishamanver
Copy link

Getting the following issue when using alpine 3.20.1:

libssl3 3.3.1-r0 has vulnerability CVE-2024-5535 which is fixed in 3.3.1-r1
libcrypto3 3.3.1-r0 has vulnerability CVE-2024-5535 which is fixed in 3.3.1-r1

@DoryZi
Copy link

DoryZi commented Jul 8, 2024

Has this been solved? I also get libssl ..

@fossdd
Copy link

fossdd commented Jul 8, 2024

yes, has been fixed: https://security.alpinelinux.org/vuln/CVE-2024-5535

@gnowland
Copy link

gnowland commented Jul 8, 2024

It has been fixed but an alpine patch (e.g. alpine3.20.2) has not yet been released? https://snyk.io/test/docker/alpine%3A3.20

@fossdd
Copy link

fossdd commented Jul 8, 2024 via email

@tianon
Copy link
Contributor

tianon commented Jul 10, 2024

Look like we need a rebuild/re-release across all supported versions: (cc @ncopa) ❤️

$ bashbrew list --uniq alpine | xargs -rtI'{}' docker run --rm --pull=always '{}' apk --quiet --no-cache list --upgradeable
docker run --rm '--pull=always' alpine:20240606 apk --quiet --no-cache list --upgradeable
20240606: Pulling from library/alpine
Digest: sha256:166710df254975d4a6c4c407c315951c22753dcaa829e020a3fd5d18fff70dd2
Status: Image is up to date for alpine:20240606
apk-tools
busybox
busybox-binsh
ca-certificates-bundle
libcrypto3
libssl3
ssl_client
docker run --rm '--pull=always' alpine:3.20.1 apk --quiet --no-cache list --upgradeable
3.20.1: Pulling from library/alpine
Digest: sha256:b89d9c93e9ed3597455c90a0b88a8bbb5cb7188438f70953fede212a0c4394e0
Status: Image is up to date for alpine:3.20.1
ca-certificates-bundle
libcrypto3
libssl3
docker run --rm '--pull=always' alpine:3.19.2 apk --quiet --no-cache list --upgradeable
3.19.2: Pulling from library/alpine
Digest: sha256:af4785ccdbcd5cde71bfd5b93eabd34250b98651f19fe218c91de6c8d10e21c5
Status: Image is up to date for alpine:3.19.2
libcrypto3
libssl3
docker run --rm '--pull=always' alpine:3.18.7 apk --quiet --no-cache list --upgradeable
3.18.7: Pulling from library/alpine
Digest: sha256:1875c923b73448b558132e7d4a44b815d078779ed7a73f76209c6372de95ea8d
Status: Image is up to date for alpine:3.18.7
libcrypto3
libssl3
docker run --rm '--pull=always' alpine:3.17.8 apk --quiet --no-cache list --upgradeable
3.17.8: Pulling from library/alpine
Digest: sha256:a6063e988bcd597b4f1f7cfd4ec38402b02edd0c79250f00c9e14dc1e94bebbc
Status: Image is up to date for alpine:3.17.8
libcrypto3
libssl3

@gnowland
Copy link

gnowland commented Jul 11, 2024

Thanks for confirming @tianon! Just because something is said to be true doesn't necessarily make it so :)

I look forward to the patch being released as this is holding up quite a few of my build pipelines 😎

@astrolemonade
Copy link

I am looking forward to seeing this patched. Alpine clearly has the packages to fix this vulnerability by running apk update && apk upgrade but they don't seem to be reflected in the docker image.

@bpowers1215
Copy link

Are there any updates that can be provided on when the community can expect new builds available to resolve the critical vulnerability with openssl?

https://hub.docker.com/layers/library/alpine/3.19/images/sha256-b836e8a5a3ad3a108cdcdad7087a63089b2dd2e2f30bd9121edd8dbc06a3124d?context=explore

@sxa
Copy link

sxa commented Jul 18, 2024

@tianon We haven't had a response from the Alpine maintainers on this so far. Is there a way you could trigger a rebuild of Alpine's images so others dependent on it (such as eclipse-temurin) get the update? I'm guessing that a rebuild would be enough to pick up the later packages from the repository without any additional updates.

@tianon
Copy link
Contributor

tianon commented Jul 18, 2024

If we were responsible for building the rootfs, yes, that would work, but we are not, so that would unfortunately not make a difference for these packages contained in the base image rootfs tarballs.

@fossdd
Copy link

fossdd commented Jul 18, 2024 via email

@ncopa
Copy link
Contributor

ncopa commented Jul 22, 2024

please note that this is a low severity issue according upstream. They did not even bother create new upstream release for it.

ncopa added a commit to ncopa/official-images that referenced this issue Jul 22, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

9 participants