How to fix Microsoft Azure Linux 3.0 Security Update for glibc (61877) in the MCR image mcr.microsoft.com/azurelinux/base/nodejs:20.14,seems the image is owned from Microsoft Container registry by Azure linux team,

Siddartha Siddartha (ALLYIS INC) 20 Reputation points Microsoft External Staff
2025-10-31T10:28:34.7866667+00:00

How to fix Microsoft Azure Linux 3.0 Security Update for glibc (61877) in the MCR image mcr.microsoft.com/azurelinux/base/nodejs:20.14, seems the image is owned from Microsoft Container registry by Azure linux team

Azure Container Registry
Azure Container Registry
An Azure service that provides a registry of Docker and Open Container Initiative images.
{count} votes

Answer accepted by question author
  1. Manish Deshpande 1,170 Reputation points Microsoft External Staff Moderator
    2025-11-03T07:34:56.5433333+00:00

    Hello @Siddartha Siddartha (ALLYIS INC)

    Thank you for contacting us about the issue.

    We found detailed internal guidance and work items related to fixing the Microsoft Azure Linux 3.0 Security Update for glibc (61877) vulnerability in container images, including the one you mentioned (mcr.microsoft.com/azurelinux/base/nodejs:20.14). Here’s how you can guide the customer:

    Cause of the issue - The vulnerability (ID 61877) affects glibc in Azure Linux 3.0-based images. Microsoft has released updated packages and patched container images to address this issue. Exploitation could compromise integrity, availability, and confidentiality.

    • Check if the user is using the vulnerable image: docker inspect mcr.microsoft.com/azurelinux/base/nodejs:20.14 | grep glibc
    • Confirm glibc version. Vulnerable versions are older than 2.38 (Azure Linux 3.0 patched version). [ODN027 - A…Container | Word]

    Pull Updated Image

    Redeploy Containers

    • After pulling the updated image, redeploy workloads: docker-compose down && docker-compose up -d
    • For AKS or container apps, update the deployment YAML to reference the new image digest and apply: kubectl set image deployment/<name> <container>=mcr.microsoft.com/azurelinux/base/nodejs:20.14@<digest>
    • Run vulnerability scan (e.g., trivy or Microsoft Defender for Containers) to confirm glibc is patched.
    • Ensure no CVE related to glibc remains.

    Optional: Build Custom Image if the user uses a custom image based on this base image:

    • Update Dockerfile:
      • FROM mcr.microsoft.com/azurelinux/base/nodejs:20.14 RUN dnf update -y glibc && dnf clean all
      • Rebuild and redeploy.

    References -

    Thanks,
    Manish Deshpande.

    0 comments No comments

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.