This release includes the following updates
- Updated Base Images: Upgraded to UBI8 and UBI9 for enhanced security and maintainability.
- Updated libnsl Dependency: Updated to ensure improved security and compatibility.
Known Issues and Limitations
- The root image must be run in privileged mode. If the image isn't run as privileged, the calls that use
sudo
in the startup script will fail due to lack of required permissions as the image will not be able to create a user with the required permissions. To run in non-privileged mode, use one of the “rootless” image options. - Using the "leave" button in the Admin interface to remove a node from a cluster may not succeed, depending on your network configuration. Use the Management API to remove a node from a cluster. See: https://docs.marklogic.com/REST/DELETE/admin/v1/host-config.
- Rejoining a node to a cluster, that had previously left that cluster, may not succeed.
- MarkLogic Server will default to the UTC timezone.
- The latest released version of RedHat UBI images have known security vulnerabilities.
- curl (CVE-2016-5420, CVE-2016-5419, CVE-2016-5421, CVE-2017-3604, CVE-2016-3418, CVE-2017-3605, CVE-2016-0694, CVE-2017-3607, CVE-2017-3608, CVE-2017-3606, CVE-2016-0689, CVE-2017-3609, CVE-2016-0692, CVE-2016-0682, CVE-2016-5420, CVE-2016-5419, CVE-2016-5421, CVE-2023-28322)
- elfutils (CVE-2017-3610, CVE-2017-3611, CVE-2017-3612, CVE-2017-3613, CVE-2017-3614, CVE-2017-3615)
- gawk (CVE-2017-3616)
- gdb (CVE-2017-3617)
- glib/glibc (CVE-2016-5420, CVE-2016-5421, CVE-2016-5419, CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2019-12450, CVE-2020-6096)
- libcap (CVE-2023-2603)
- libdb-utils (CVE-2016-0682, CVE-2016-0689, CVE-2016-0692, CVE-2016-0694, CVE-2016-3418, CVE-2017-3604, CVE-2017-3605, CVE-2017-3606, CVE-2017-3607, CVE-2017-3608, CVE-2017-3609, CVE-2017-3610, CVE-2017-3611, CVE-2017-3612, CVE-2017-3613, CVE-2017-3614, CVE-2017-3615
CVE-2017-3616, CVE-2017-3617) - libksba (CVE-2022-3515, CVE-2022-47629)
- libssh (CVE-2023-6004)
- nspr (CVE-2016-1951)
- pam (CVE-2022-28321)
These packages are included in the RedHat UBI base images but, to-date, no fixes have been made available. Even though these libraries may be present in the base image that is used by MarkLogic Server, they are not used by MarkLogic Server itself, hence there is no impact or mitigation required.
-
As part of the hardening process, the following packages are removed from the image:
vim-minimal
,cups-client
,cups-libs
,tar
,python3-pip-wheel
,platform-python
,python3-libs
,platform-python-setuptools
,avahi-libs
,binutils
,expat
,libarchive
,python3
,python3-libs
,python-unversioned-command
. These packages are not required for the operation of MarkLogic Server and are removed to reduce the attack surface of the image. If you require any of these packages, you can install them in your own Dockerfile. -
The scoring of the hardening process is 96.67% that because
authselect is not used but files from the 'pam' package have been altered, so the authselect configuration won't be forced.
It is a medium severity and not applicable in container environment there is not authentication required when login into a container.
8. The cryptographic modules of RHEL 9 are not yet certified for the FIPS 140-3 requirements.