-
Notifications
You must be signed in to change notification settings - Fork 42
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Package Request] - High Vulnerable Python3 support packages #928
Comments
Do you have specific details about which vulnerability you are concerned about and have you checked our security advisories for the possible presence of backports/fixes ? |
I think the most important one, and the one I have detected, is cryptography: CVE-2023-0286. This vulnerability cannot be mitigated unless AWS CLI is updated. However, the latest version available via yum detects that it is already up-to-date, so you have to manually download the binary using curl. Here is the advisory for the cryptography package: GHSA-x4qr-2fvf-3mr5. Could you confirm if there are any backported fixes for this issue in Amazon Linux 2023? |
Amazon Linux near universally ensures software packages link to central shared libraries, so when we update them, all packages that depend on that library get updated. The It appears that the upstream Python cryptography project distributes a binary wheel which includes an embedded copy of OpenSSL. This is different to the binary that is in the RPM that you can install from the Amazon Linux 2023 repositories. Does this answer your question? |
We are seeing similar CVE findings from the Wiz.io service that scans our instances for vulnerabilities; specifically around
Since these system packages are not installed via pip, what options would we have to address? Or is this a false positive? The package manager is still showing the version as 36.0.1 in the latest Amazon Linux 2023 AMI.
Additional info shows that the python-cryptography package is using the embedded version 3.0.8 of openssl:
|
As you can see, the hazmat backend is just a wrapper around the installed openssl shared library (which is provided by the openssl package). So this is a false positive from Wiz.io. As @stewartsmith explained, the RPM variant of |
Looks like there's no issue with Amazon Linux here, and rather an issue with Wiz.io and how it scans Amazon Linux 2023. I'm going to close this issue, but feel free to reopen if there is something else found. |
Wiz and other scanning tools will go by the version of the package. Does AWS not increment package versions to match what would show up through pip? |
It is common for distros like Amazon Linux (or RHEL) to backport fixes to older versions of packages, so generally just looking at a version of a package without specific knowledge about the distro isn't going to work. Scanners should be aware of that and are expected to have distro specific rules. We also publish CVE information on our own ALAS. In this specific case, this seems to stem from an incorrect assumption that Now that doesn't mean we might not decide to update |
Another example of the above is RHEL 9 which also ships |
What package is missing from Amazon Linux 2023? Please describe and include package name.
Is this an update to existing package or new package request?
Update to an existing package
Is this package available in Amazon Linux 2? If it is available via external sources such as EPEL, please specify.
Any additional information you'd like to include. (use-cases, etc)
The above-mentioned package contains the High Vulnerability in al2023-ami-ecs-hvm-2023.0.20250310-kernel-6.1-x86_64
The text was updated successfully, but these errors were encountered: