-
Notifications
You must be signed in to change notification settings - Fork 219
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2021-3177 #1005
Comments
Thanks! 3.8.8rc1 and 3.9.2rc1 will be promoted on Monday March 1st, I think at that point we can bump all the versions in the Dockerfile and release new images. |
@di, thanks for reminding the timeline for 3.8 & 3.9 @aws-taylor , thanks for the info
manylinux does not ship libpython.a (c.f. #91 requesting for it to be added). So no, wheels are not affected, only the interpreters are. |
Great! Thanks for the clarification. I see now that it was being included via some docker volume/-v mounts that I was passing in my local test. With regards to python 3.5, is it worth trying to figure out how to turn on hardening since it does not appear that cpython is going to patch this issue or punt since python 3.5 will hopefully be dropped soon anyways per #995 ? |
xref #1006 which updates cp38/cp39 With regards to python 3.5, I guess nothing will be done for now and it will be dropped soon. Please bear in mind that Rebuilding everything with hardening should probably be possible (although it might or might not be orthogonal with #59) |
* Use hardening for building all tools & libraries This does not affect the wheels that are produced by end users as proposed in #59 but mitigates potential security issues in the tools used by manylinux images as mentioned in #1005 * Always update system packages in the final step Since docker cache is used, system packages are not updated when cache is present. Always update them in the final step.
I'll close this one now that:
|
Hello ManyLinux team,
Redhat just announced a new security vulnerability detected in python - https://access.redhat.com/security/cve/cve-2021-3177 - that appears to impact the interpreters shipped in the manylinux containers (or at least 2010). Given that manylinux deliberately ships libpython.a, it seems like teams that are using this container to build portable binary python .whl files may be at risk. At this time, python 3.6 and 3.7 appear to be patched, so I think the fix is simply updating the minor version in the Dockerfile. It appears that 3.8 and 3.9 are not yet fixed.
The related issue https://bugs.python.org/issue42938 has a short test to reproduce:
This may also be a good reason to revisit the discussion in #59 with regards to fortifying the python interpreters.
The text was updated successfully, but these errors were encountered: