Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Azure Linux 3.0] Produce a FIPS compliant, FedRAMP approved image #8360

Open
oaljoundi opened this issue Mar 12, 2024 · 6 comments
Open

[Azure Linux 3.0] Produce a FIPS compliant, FedRAMP approved image #8360

oaljoundi opened this issue Mar 12, 2024 · 6 comments
Assignees

Comments

@oaljoundi
Copy link
Contributor

No description provided.

@oaljoundi oaljoundi converted this from a draft issue Mar 12, 2024
@oaljoundi oaljoundi assigned oaljoundi and jblanch2 and unassigned oaljoundi Mar 12, 2024
@codonell
Copy link

codonell commented May 1, 2024

Just out of curiosity, as an upstream glibc developer, glibc security team member, and glibc CNA member... what is your plan to address CVEs under the SLA required for FedRAMP? For example

- Add patches for CVE-2023-4806 and CVE-2023-5156
is currently 8 CVEs behind for glibc.

This is an interesting feature... but it has a lot of process requirements. Upstream we're working on publishing our advisories so they can be consumed e.g. https://sourceware.org/cgit/glibc/tree/advisories/GLIBC-SA-2024-0004?id=91695ee4598b39d181ab8df579b888a8863c4cab is this useful to you?

@jperrin
Copy link
Contributor

jperrin commented May 1, 2024

Carlos! it's been a while!

That actually looks like it could be quite useful, but it's also going to cause a tiny rant because with the NIST/NVD drama, the kernel being its own CNA, this, etc I feel like the industry is moving backwards a bit to individual silos and a little too much decentralization.

@eric-desrochers this might be something for us to plug into our tooling.

@eric-desrochers
Copy link
Contributor

eric-desrochers commented May 1, 2024

Upstream we're working on publishing our advisories so they can be consumed e.g. https://sourceware.org/cgit/glibc/tree/advisories/GLIBC-SA-2024-0004?id=91695ee4598b39d181ab8df579b888a8863c4cab is this useful to you?

Nice to virtually meeting you @codonell

The SPEC file you are refering to is from our stable release of Mariner 2.0 that contains glibc v2.35.
Version: 2.35

Your are right our last CVE fixes were for:

%changelog
* Wed Oct 04 2023 Minghe Ren <[email protected]> - 2.35-6
- Add patches for CVE-2023-4806 and CVE-2023-5156

Looking at your advisory: https://sourceware.org/cgit/glibc/tree/advisories/
Look like there was 4 more CVEs after CVE-2023-5156 , but you mention we are 8 CVEs behind ? I'd like to understand what are we potentially missing here that we haven't fixed nor analyzed if any.

I'll share to our security dev the information about your glibc advisory publishing. Thanks !

@codonell
Copy link

codonell commented May 2, 2024

@eric-desrochers You aren't missing anything. There are 4 reserved CVEs that are public (not under embargo) for which we're about to publish advisories. You can see them here: CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602 If you don't use nscd anywhere for a local cache then you won't be affected, but it's hard to argue that since scanners look at source-level attribution only.

@codonell
Copy link

codonell commented May 2, 2024

@eric-desrochers The really pertinent question for me, and the reason I commented on this ticket is to determine if the information is valuable and useful to you. Are you able to consume the git repo advisory data as input to tooling? I would like to avoid needing to describe upstream glibc as an OVALv2 endpoint.

@eric-desrochers
Copy link
Contributor

@codonell thanks for the reserved CVEs sharing.
For the advisory, I have shared the information with our CVE detection tool team.

We'll get back to you when I hear back from them.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: In Progress (Development)
Development

No branches or pull requests

5 participants