-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
glibc: CVE-2015-7547 #1448
Comments
RHEL 6 and RHEL 7 have fixes (cc @jperrin) Fedora has an update submitted (cc @maxamillion) openSUSE update is in-progress (cc @flavio) |
Debian tarballs are in-progress (almost complete -- just waiting on the Ubuntu doesn't have updated packages yet |
our packages are syncing to the mirrors now. I'll have an updated build shortly. |
OL6 and OL7 have fixes and a new build has been requested from our build team. |
will all the official docker-library images be rebuilt automatically? |
@ThiefMaster yes, they're in-progress right now @jperrin @Djelibeybi thanks for the updates! 👍 |
@tianon this has the patched packages http://www.ubuntu.com/usn/usn-2900-1/ |
@diogomonica nice -- wonder why they didn't update http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-7547.html yet I'll give our Canonical contacts a poke and see what the ETA for updated tarballs is. (At their request, we consume their tarballs from https://partner-images.canonical.com/core/, built by Canonical on their official infra, so as soon as those are updated I can update the image.) |
@tianon yeah, I didn't understand that either. I was checking the CVE page too. |
Heard back and Ubuntu rebuilds are in progress downstream! 👍 |
As a minor update, there was a snag in Canonical's update process that's delayed the artifact generation on their side -- I'll keep an eye on things, but it looks like we likely won't get those artifacts until early tomorrow (relative to PST). |
Oracle images updated in #1453 |
What's the best way to see whether an official image has already been updated or not? For example the mongo image on docker hub still shows "last pushed 14d ago" so i guess it's still vulnerable? |
@tianon when can we expect all the major images to be rebuilt eg |
@macropin for CentOS, we're waiting for the image maintainer to provide an updated rootfs; for the Debian-based portion of the library, we're waiting for the images themselves to finish rebuilding (there are a ton of them, and it takes quite a while to rebuild them all) Ubuntu is going to have a PR shortly. |
Both |
Just a quick update, openSUSE 42.1, 13.2 and tumbleweed packages are being rolled out at different paces. I'll update all the images as soon as the packages are there. |
Out of curiosity, why do the rebuilds take so long for the debian-based images? |
That'd mostly be because we have over 300 officially supported tags based directly on |
Thanks @flavio! ❤️ |
Sorry for the delay on getting this one in. #1455 |
https://bugzilla.redhat.com/show_bug.cgi?id=1308943#c7 claims the update is available 😄 |
And the latest
|
@macropin thanks for the additional info and testing -- @maxamillion thoughts on what might've happened? 😕 |
@frapposelli just realized I need to add |
Fixes glibc and libssl issues (see issue docker-library#1448) Signed-off-by: Flavio Castelli <[email protected]>
@tianon no security tracker at the moment (working on that), best way is to look at the SPEC dir (either Seems like the guys already pushed a patch: vmware/photon@fdf30fa |
Ok, Fedora fix is pushed. 😄 👍 |
@frapposelli nice! 😄 Does that mean it's ready for an image rootfs rebuild, or is there further process it has to go through first? |
@tianon they have an automated process that uploads the new artifacts, I'm checking with them for a timeline, once they're up I will send a PR with the update 👍 |
@frapposelli rock on, sounds great ❤️ |
@juanluisbaptiste looks like |
@tianon yes I already did the image update locally, but it seems I got distracted by something and totally forgot to finish it, probably I saw a squirrel through the window or something hehe. I'll finish the update later today when I'm back home. |
@tianon Ready, please check. |
Updated images glibc: CVE-2015-7547 #1448
Fixes glibc and libssl issues (see issue docker-library#1448) Signed-off-by: Flavio Castelli <[email protected]>
I think this is likely as good as it's going to get at this point. 👍 |
CVE-2015-7547: glibc getaddrinfo stack-based buffer overflow
https://googleonlinesecurity.blogspot.no/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
alpine
: no glibc package availablebusybox
: Rebuild busybox to account for CVE-2015-7547 #1451centos
(RHEL derivative): update as of 20160217 - fixes glibc cve #1455crux
:debian
: Update debian (especially for CVE-2015-7547) #1450fedora
: update fedora 23 and rawhide for glibc: CVE-2015-7547 #1456, update fedora 22 and 23 for glibc: CVE-2015-7547 #1461mageia
: Update Mageia 5 (especially for CVE-2015-7547) #1468opensuse
: Update openSUSE 42.1 and tumbleweed #1460, update openSUSE 13.2 image #1465oraclelinux
: Updated Oracle Linux 7.2 and 6.7 images to resolve CVE-2015-7547. #1453photon
:sourcemage
:ubuntu
: Update ubuntu (especially for CVE-2015-7547) #1454The text was updated successfully, but these errors were encountered: