Cloud Operations
Production CATRancherDatadog
  • Welcome
  • Fundamental Concepts
    • Authoring
    • Reportability
    • Knowledge Modules
    • Synchronization
    • Mirth & Message Queuing
    • Glossary
  • Operations Handbook
    • Achieving Steady State
    • Leveraging Kubernetes
    • Triaging Issues
    • Escalation Policy
    • Playbooks
      • Sync-all (Redeploy) Knowledge Modules
  • Deployments
    • Methodology
    • Bill of Materials
      • AIMS Production
        • 2025
          • 2025-02-12
          • 2025-03-19
          • 2025-04-30
          • 2025-06-25
        • 2024
          • 2024-01-31
          • 2024-04-03
          • 2024-04-03 [PATCH]
          • 2024-06-05 [patched 05/31]
          • 2024-06-10 [PATCH TO 2024-06-05]
          • 2024-06-20 [PATCH TO 2024-06-05]
          • 2024-08-14
          • 2024-08-26 [PATCH TO 2024-08-14]
          • 2024-10-16
          • 2024-12-11
          • 2024-12-11 [PATCH 1]
        • 2023
          • 2023-02-22
          • 2023-02-22 Patch 01
          • 2023-05-18
          • 2023-07-26
          • 2023-10-04
          • 2023-11-15
        • 2022
          • 2022-12-14
          • 2022-11-09
          • 2022-09-28
          • 2022-08-18
          • 2022-07-13
          • 2022-06-15
          • 2022-05-16
          • 2022-05-02
          • 2022-04-27
          • 2022-04-21
          • 2022-04-14
          • 2022-04-13
          • 2022-04-12
          • 2022-03-14
          • 2022-02-16
          • 2022-1-27
          • 2022-01-24
          • 2022-01-06
        • 2021
          • 2021-12-06
          • 2021-11-29
          • 2021-11-17
      • AIMS PRR
        • 2023
          • 2023-02-22
          • 2023-02-22 Patch 01
          • 2023-05-18
          • 2023-07-26
          • 2023-10-04
          • 2023-11-15
        • 2022
          • 2022-12-14
          • 2022-11-09
          • 2022-09-28
          • 2022-08-18
          • 2022-07-13
          • 2022-06-15
          • 2022-05-16
          • 2022-05-02
          • 2022-04-27
          • 2022-04-21
          • 2022-04-14
          • 2022-04-13
          • 2022-04-12
          • 2022-01-06
        • 2021
          • 2021-12-06
          • 2021-11-29
          • 2021-11-17
        • 2024
          • 2024-01-31
          • 2024-04-03
          • 2024-04-03 [PATCH]
          • 2024-06-05 [patched 05/31]
          • 2024-06-10 [PATCH TO 2024-06-05]
          • 2024-06-20 [PATCH TO 2024-06-05]
          • 2024-08-14
          • 2024-08-26 [PATCH TO 2024-08-14]
          • 2024-10-16
          • 2024-12-11
          • 2024-12-11 [PATCH 1]
        • 2025
          • 2025-02-12
          • 2025-03-19
          • 2025-04-30
          • 2025-06-25
      • AIMS Onboarding
        • 2023
          • 2023-02-22
          • 2023-02-22 Patch 01
          • 2023-05-18
          • 2023-07-26
          • 2023-10-04
          • 2023-11-15
        • 2022
          • 2022-12-14
          • 2022-11-09
          • 2022-09-28
          • 2022-08-18
          • 2022-07-13
          • 2022-06-15
          • 2022-05-16
          • 2022-05-02
          • 2022-04-27
          • 2022-04-21
          • 2022-04-14
          • 2022-04-13
          • 2022-04-12
          • 2022-04-04
          • 2022-01-06
        • 2021
          • 2021-12-06
          • 2021-11-29
          • 2021-11-17
        • 2024
          • 2024-01-31
          • 2024-04-03
          • 2024-04-03 [PATCH]
          • 2024-06-05 [patched 05/31]
          • 2024-06-10 [PATCH TO 2024-06-05]
          • 2024-06-20 [PATCH TO 2024-06-05]
          • 2024-08-14
          • 2024-08-26 [PATCH TO 2024-08-14]
          • 2024-10-16
          • 2024-12-11
          • 2024-12-11 [PATCH 1]
        • 2025
          • 2025-02-12
          • 2025-03-19
          • 2025-04-30
          • 2025-06-25
      • Archived Environments
        • AIMS Sandbox
          • 2022-01-06
          • 2021-12-06
          • 2021-11-29
          • 2021-11-17
          • 2021-09-21
          • 2021-09-20
          • 2021-08-27
          • 2021-07-01
          • 2021-06-21
          • 2021-06-07
          • 2021-06-17
          • 2021-05-26
  • Architecture
    • Overview
    • Diagrams
      • HLN Hosted Environments
    • Data State
      • Authoring Database
      • Cloud Storage Buckets
      • Document Database
    • Kubernetes
      • Services
      • Workloads
        • Common Sidecars
          • 🚮GC Logging for Java
          • 🪢Cloud SQL Proxy
        • DSS
          • DSS Preflight Container
          • DSS Container
        • DSUS
          • DSUS Container
        • MTS
          • MTS Container
        • OUS
          • OUS Container
        • RGS
          • RGS Container
        • RRS
          • RRS Container
        • SS
          • SS Container
        • SSCS
          • SSCS Container
        • VCS
          • VCS Container
        • In-Development
          • EIS
          • FHIR
    • Web Applications
      • CAT
  • GitBook Resources
    • Workload Template
      • Container Template
Powered by GitBook
On this page
  • Release Notes / Changelog
  • Summary
  • VCS
  • DSS
  • DSS-PFC
  • MTS
  • CAT-RCKMS
  • Bill of Materials
  1. Deployments
  2. Bill of Materials
  3. AIMS PRR
  4. 2022

2022-04-21

Previous2022-04-27Next2022-04-14

Last updated 3 years ago

Release Notes / Changelog

Summary

The following container image updates have been made to remediate security concerns identified via vulnerability scanning and documented .

VCS

Update container base image; cherry-pick v2.3.1 commit to fix jib plugin

  • adoptopenjdk package was marked deprecated on 08/2021; eclipse-temurin is recommended replacement per README

  • jdk8u322-b06 was released 08 MAR 2022, which should include latest security updates flagged by Ruvos security audit.

  • also includes update to jib plugin to support base image declaration from pom.xml, previously included in v2.3.1 but never released upstream

DSS

Add wget for probes

To reduce the impact of modifying the container base image, adding the missing wget package will return probes to normal working order, and not require any additional modification on the HLN or Ruvos side for normal container operation.

Remove ambiguous argument to adduser

The command '/bin/sh -c adduser -u 1000 -D appuser && rm -rf /usr/local/tomcat/webapps/docs /usr/local/tomcat/webapps/ROOT /usr/local/tomcat/webapps/examples /usr/local/tomcat/webapps/host-manager /usr/local/tomcat/webapps/manager && mkdir -p /home/appuser/.opencds /home/appuser/.opencds-test /home/appuser/opencds-rckms-data/resources /home/appuser/opencds-rckms-data-test/resources /home/appuser/opencds-logs /home/appuser/opencds-logs-test' returned a non-zero code: 1 Option d is ambiguous (debug, disabled-login, disabled-password)

Per (manpage for adduser)[https://linux.die.net/man/8/adduser], appears it just applied system defaults -- which has since been udpated to be the default behavior.

Update container base image

  • tomcat:9-jre8-alpine was last updated 15 MAY 2019 and contained Java 8u212

  • tomcat:9-jre8-temurin was released 06 APR 2022, containing Java jdk8u322-b06, which should include latest security updates to resolve those flagged by Ruvos security audit

  • Pinning to this new image ensures we will receive future security updates, so long as this tag remains updated

DSS-PFC

Update Dockerfile for AWS deployments

MTS

Remove/update binaries without breaking Java

Safe to apt remove:

  • bzip2

  • python

Upgraded to */stable, instead of being removed:

  • libpng16-16:amd64@1.6.37-3, which is greater than 1.6.28-1+deb9u1 as noted in Ruvos vulnerability report spreadsheet

  • libsndfile1:amd64@1.0.31-2, which is greater than 1.0.27-3 as noted in Ruvos vulnerability report spreadsheet

  • libsqlite3-0:amd64@3.34.1-3, which is greater than 3.16.2-5+deb9u3 as noted in Ruvos vulnerability report spreadsheet

  • util-linux@2.36.1-8+deb11u1, which is greater than 2.29.2-1+deb9u1 as noted in Ruvos vulnerability report spreadsheet

Sustained as upgrade to */stable (performed in prior commit)

  • libc-bin@2.31-13+deb11u3, which is greater than 2.28-10+deb10u1 as noted in Ruvos vulnerability report spreadsheet

  • libc6:amd64@2.31-13+deb11u3, which is greater than 2.28-10+deb10u1 as noted in Ruvos vulnerability report spreadsheet

  • libc6-dev:amd64@2.31-13+deb11u3, which is greater than 2.28-10+deb10u1 as noted in Ruvos vulnerability report spreadsheet

Update packages available with bullsye distro prior to install

The command '/bin/sh -c echo "deb http://deb.debian.org/debian bullseye main non-free contrib" >> /etc/apt/sources.list && apt -qq -y install libc6/stable libc6-dev/stable libc-dev-bin/stable' returned a non-zero code: 100 E: Release 'stable' for 'libc-dev-bin' was not found E: Release 'stable' for 'libc6-dev' was not found E: Release 'stable' for 'libc6' was not found

CAT-RCKMS

  • Update bootstrap to 3.4 due to 3.3 XSS vulnerability

Bill of Materials

Changes to component SHA1 / Tag values (indicating a release) are marked as emboldened line entries. Components link to their respective documentation, and tags link to the Github repository release for that individual component.

Component

Shortname

SHA1

Tag

CAT

96c8f57

DSUS

29b5d30

DSS

70240ca

dss-preflight-container

DSS-PFC

7b929b3

MTS

a7ce889

OUS

3525806

RRS

f11c8be

RGS

463fd9d

SS

774f4fb

SSCS

2736989

VCS

bdc5ff7

Reviewing the aws-cli@v2 , I don't see any s3 related breaking changes, so we'll use the latest image available, 2.5.7, which should include fixes for the sole vulnerability raised.

here
changelog
data-support-update-service
decision-support-service
middle-tier-service
opencds-update-service
rckms-reports-service
rules-generation-service
shared-service
ss-comparison-service
vmr-converter-service
cat-rckms
2.11.2
1.6.3
2.5.1
1.1.3
2.4.3
1.6.0
1.1.0
2.0.16
1.6.6
1.3.0
2.3.4