Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Define policy for identifying security issues in prerequisite software products #3265

Open
sxa opened this issue Feb 24, 2023 · 4 comments
Open

Comments

@sxa
Copy link
Member

sxa commented Feb 24, 2023

Once we have determine which components are critical for the build process on each platform we should use this information to determine policies regarding how/when/if to perform updates or mitigate them and start using those policies so that we avoid being exposed via CVEs which may be raised by our customers. We should be proactive in identifying and resolving such issues.

@sxa
Copy link
Member Author

sxa commented Jun 13, 2023

Initial list of software that would be in scope for this for Temurin builds (currently excluding the items supplied with the OS such as glibc, cups, systemtap and X11 libraries)

  • Compiler (gcc, xlc, VS, Xcodeetc.)
  • freetype
  • alsa
  • zlib
  • ant? (Used for SBOM creation but not the build itself)

@sxa
Copy link
Member Author

sxa commented Jul 12, 2023

Need to verify which of these are now included in the SBOM and whether others would be required.

@sxa
Copy link
Member Author

sxa commented Aug 21, 2023

I'm going to list the products in this comment as they are identified along with their official page, and a link to any related CVEs as a basis for this:

Product Home page CVE list
Compiler - gcc (Linux) https://gcc.gnu.org/ CVEdetails
Compiler - xlc (AIX) https://www.ibm.com/products/xl-c-aix-compiler-power ?
Compiler - VS (Windows) https://visualstudio.microsoft.com/vs/community/ CVEdetails
Compiler - Xcode (macos) https://developer.apple.com/xcode/ CVEdetails
Freetype https://freetype.org/ CVEdetails
ALSA https://alsa-project.org CVEdetails
zlib https://www.zlib.net/ CVEdetails
Apache Ant https://ant.apache.org/ CVEdetails
GNU Make https://www.gnu.org/software/make/ CVEdetails

@sxa
Copy link
Member Author

sxa commented Oct 16, 2023

We now have a reasonably complete SBOM, only missing some of the compiler details for non-Linux platforms.

It should be noted that zlib, freetype and alsa are all things which are included into the openjdk build, and therefore we should ensure that we follow the advice of the upstream openjdk project where feasible to ensure we remain secure. The other tools are things we have full control over and should aim to monitor those on a regular basis to ensure that our machines are suitably secure, which means we should review the CVEs on a regular basis - either monthly, or on a cycle that matches the quarterly PSU updates of Eclipse Temurin.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: Todo
Development

No branches or pull requests

1 participant