How to address security vulnerabilities in current azure functions docker images provided and used by Microsoft itself?

paulocorreia 6 Reputation points
2021-08-13T13:59:53.503+00:00

Hi,

Recently we started doing security assessment on our cloud resources, and to our surprise we found out, that the images from Microsoft we're relying, have a considerable number of vulnerabilities to be fixed!

Most of them have fixes available for some time, still they remain unpatched.

We're talking about sdk images (OK these are not used as runtime, but still should be patched), and most important, the runtime images that actually run the applications!

A simple docker scan gave the following results:

  • mcr.microsoft.com/azure-functions/dotnet:3.0-appservice
    Docker scan result:
    123087-image.png
  • mcr.microsoft.com/dotnet/core/sdk:3.1
    Docker scan result:
    123088-image.png
  • mcr.microsoft.com/azure-functions/python:3.0-python3.8-appservice
    Docker scan result:
    123076-image.png
  • mcr.microsoft.com/azure-functions/python:3.0-python3.8-core-tools:
    Docker scan result:
    123105-image.png Alternatives are to... compile almost everything from source, as you might guess, for the customer that's not acceptable.

Can the customer do anything here to help?

Azure Functions
Azure Functions
An Azure service that provides an event-driven serverless compute platform.
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. MayankBargali-MSFT 70,986 Reputation points Moderator
    2021-08-16T04:40:00.26+00:00

    @paulocorreia Can you create the issue in azure function docker so the team can look into this further. Please share the violations scan reports when you create the issue in azure function docker repository. As per the screenshot I couldn't see more details on the vulnerabilities part on what CVEs causing this issue.

    If there is an issue with CVEs mentioned in your violations report and the issue is with with underlying Debian image that is used for functions then this need to be first fixed at the Debian base image by the Debian team. Once the issue is fixed by them then we can fixed the same at our end with the base image used.

    For vulnerabilities caused due to our end or the Debian has already fixed it in their base image then the function docker team can help in fixing it.

    There are many reasons for CVEs to still be shown in production images at Debian end and you can read this for information: https://github.com/docker-library/faq#why-does-my-security-scanner-show-that-an-image-has-cves

    If any CVEs that you think might affect you. You can track them using this link: https://security-tracker.debian.org/tracker/
    Further, you can raise the issue with Debian for specific CVEs that are related to debian base image.

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.