andscoop opened a new issue, #10311:
URL: https://github.com/apache/pinot/issues/10311

   Pinot is falling behind on image and dependency security. In addition to 
#10274, I have two other high-level concerns that are going to affect security 
conscious organizations ability to run Apache Pinot on production 
infrastructure.
   
   I'm curious to hear the team's thoughts on the issues below. 
   
   ### docker image concerns
   `pinot-base` image is currently based on the `openjdk` 
[image](https://hub.docker.com/_/openjdk) which is "officially deprecated" and 
for "non-production builds". Our security software is noting vulnerabilities 
that would likely be fixed from changing the base image. 
   
   Pinot users should be able to solve image layer issues easily themselves by 
either building or pulling artifacts directly into an image of their choice. 
This responsibility does not fall entirely on Apache Pinot, but if pinot-base 
continues to use openjdk, I do believe non-production should be specified where 
ever the image is mentioned.
   
   ### Apache Pinot Java Dependencies
   Apache Pinot java dependencies themselves are probably the greater cause for 
concern. When pulling artifacts from the 0.12.0 release into our image, our 
security scan is flagging the CVEs listed below.
   
   Of course the responsibility does not fall entirely on the maintainers of 
the open source project. I have created #10304 to get a feel for contributing. 
I do have concerns that some of these deps upgrades are non-trivial and will 
likely require intimate knowledge of the project, or at least more java 
knowledge than I currently possess. 
   
   ```
   15:47:14.189 I Image Vulnerabilities
   15:47:14.189 I ID                    Severity        Package Name            
        Package Version
   15:47:14.189 I CVE-2022-25168        critical        
org.apache.hadoop_hadoop-hdfs   2.10.1
   15:47:14.189 I CVE-2022-23305        critical        log4j_log4j             
        1.2.17
   15:47:14.189 I CVE-2021-37404        critical        
org.apache.hadoop_hadoop-hdfs   2.10.1
   15:47:14.189 I CVE-2020-9548         critical        
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.189 I CVE-2020-9547         critical        
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.189 I CVE-2020-9546         critical        
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.189 I CVE-2020-9493         critical        log4j_log4j             
        1.2.17
   15:47:14.189 I CVE-2020-8840         critical        
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.189 I CVE-2019-20330        critical        
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.189 I CVE-2019-17571        critical        log4j_log4j             
        1.2.17
   15:47:14.189 I CVE-2019-17531        critical        
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.189 I CVE-2019-16943        critical        
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.189 I CVE-2019-16942        critical        
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.189 I CVE-2018-7489         critical        
com.fasterxml.jackson.core_jackson-databind     2.4.0
   15:47:14.189 I CVE-2019-20445        critical        io.netty_netty          
        3.10.6
   15:47:14.189 I CVE-2019-20444        critical        io.netty_netty          
        3.10.6
   15:47:14.189 I CVE-2022-26612        critical        
org.apache.hadoop_hadoop-common 2.10.1
   15:47:14.189 I CVE-2022-25168        critical        
org.apache.hadoop_hadoop-common 2.10.1
   15:47:14.189 I CVE-2021-37404        critical        
org.apache.hadoop_hadoop-common 2.10.1
   15:47:14.189 I CVE-2022-23307        high            log4j_log4j             
        1.2.17
   15:47:14.189 I CVE-2022-23302        high            log4j_log4j             
        1.2.17
   15:47:14.189 I CVE-2021-33036        high            
org.apache.hadoop_hadoop-hdfs   2.10.1
   15:47:14.189 I CVE-2021-25642        high            
org.apache.hadoop_hadoop-hdfs   2.10.1
   15:47:14.189 I CVE-2020-11113        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.189 I CVE-2020-11112        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.189 I CVE-2020-11111        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.189 I CVE-2020-10969        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.189 I CVE-2020-10968        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.189 I CVE-2020-10673        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.189 I CVE-2020-10672        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.189 I CVE-2021-20190        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.189 I CVE-2020-36189        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.189 I CVE-2020-36188        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.189 I CVE-2020-36187        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.189 I CVE-2020-36186        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.189 I CVE-2020-36185        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.189 I CVE-2020-36184        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.189 I CVE-2020-36183        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.190 I CVE-2020-36182        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.190 I CVE-2020-36181        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.190 I CVE-2020-36180        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.190 I CVE-2020-36179        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.190 I CVE-2020-35728        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.190 I CVE-2020-35491        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.190 I CVE-2020-35491        high            
com.fasterxml.jackson.core_jackson-databind     2.4.0
   15:47:14.190 I CVE-2020-35490        high            
com.fasterxml.jackson.core_jackson-databind     2.4.0
   15:47:14.190 I CVE-2020-35490        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.190 I CVE-2020-24750        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.190 I CVE-2020-24616        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.190 I CVE-2020-14195        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.190 I CVE-2020-14062        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.190 I CVE-2020-14061        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.190 I CVE-2020-14060        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.190 I CVE-2020-11620        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.190 I CVE-2020-11619        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.190 I CVE-2020-10650        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.190 I CVE-2020-10650        high            
com.fasterxml.jackson.core_jackson-databind     2.4.0
   15:47:14.190 I CVE-2022-42004        high            
com.fasterxml.jackson.core_jackson-databind     2.4.0
   15:47:14.190 I CVE-2022-42004        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.190 I CVE-2022-42004        high            
com.fasterxml.jackson.core_jackson-databind     2.12.7
   15:47:14.190 I CVE-2022-42003        high            
com.fasterxml.jackson.core_jackson-databind     2.4.0
   15:47:14.190 I CVE-2022-42003        high            
com.fasterxml.jackson.core_jackson-databind     2.12.7
   15:47:14.190 I CVE-2022-42003        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.190 I CVE-2022-41881        high            io.netty_netty-all      
        4.1.79
   15:47:14.190 I CVE-2022-41881        high            io.netty_netty          
        3.10.6
   15:47:14.190 I CVE-2022-41881        high            io.netty_netty-codec    
        4.1.79
   15:47:14.190 I CVE-2021-37137        high            io.netty_netty          
        3.10.6
   15:47:14.190 I CVE-2021-37136        high            io.netty_netty          
        3.10.6
   15:47:14.190 I CVE-2020-36518        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.190 I CVE-2020-36518        high            
com.fasterxml.jackson.core_jackson-databind     2.4.0
   15:47:14.190 I CVE-2020-25649        high            
com.fasterxml.jackson.core_jackson-databind     2.9.10
   15:47:14.191 I CVE-2019-16869        high            io.netty_netty          
        3.10.6
   15:47:14.191 I CVE-2021-22573        high            
com.google.oauth-client_google-oauth-client     1.31.0
   15:47:14.191 I CVE-2022-45693        high            
org.codehaus.jettison_jettison  1.1
   15:47:14.191 I CVE-2022-45685        high            
org.codehaus.jettison_jettison  1.1
   15:47:14.191 I CVE-2022-40150        high            
org.codehaus.jettison_jettison  1.1
   15:47:14.191 I CVE-2022-3510         high            
com.google.protobuf_protobuf-java       3.19.2
   15:47:14.191 I CVE-2022-3509         high            
com.google.protobuf_protobuf-java       3.19.2
   ```


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@pinot.apache.org.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscr...@pinot.apache.org
For additional commands, e-mail: commits-h...@pinot.apache.org

Reply via email to