-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
new Dockerfile for Kong 0.11.0 Alpine #3546
Conversation
Looks like the only change is the addition of See also the bit in https://docs.docker.com/engine/userguide/eng-image/dockerfile_best-practices/#apt-get about
Our systems will auto-rebuild the |
@tianon We did that based on this recommendation |
@tianon Basically we want to use updated zlib package from Alpine image. |
@tianon we are trying to resolve three "critical" vulnerabilities in our docker image according to the docker store security scan. It reports that zlib, PCRE, and perl all have critical vulnerabilities, yet as you can see we are using all upstream packages with no custom installations of these elements. We were advised to take this action and push a new image to trigger a new scan. Since this doesn't appear to be the correct route, please advise us as to what we should be doing to use the most up to date images available from alpine. If no action needs to be taken here, we will close this PR. Thank you. |
Are you talking about the following ones shown by the Docker Hub security scanning?
Maybe the pcre and zlib CVEs should be reported to Docker as false positive?
|
@yosifkit yes those are he packages we are referencing. There are no more recent versions of these packages, so we contacted docker support. They then told us to submit a new image. We indicated explicitly that PCRE and perl should be excluded because there are no newer versions here. What I don't quite understand is why the scan reports zlib as version 1.2.8 when, if you do a docker pull of our current image and "apk info zlib", it shows a newer version. And we are not installing zlib manually in our docker file as you can see; zlib is provided by alpine image, and that version is latest (I believe 1.2.11). If the Kong image was built after alpine image was updated, why does the scan then show an old vulnerable version? Thank you for your time and helping clear this up. We are also in contact with docker support and will reference this conversation. Thank you again. |
Can you figure out which file it is that trigger the zlib CVE? I suspect it is not the zlib.apk. We had a recent issue with python, where python ships some precompiled wininst*.exe files with the sources. Those are windows binaries which has a statically linked version of an old zlib which was triggered by the scanner. I suspect there are other binaries which is statically linked to old zlib. I'll try fix the perl issues ASAP. |
Apparently it is perl that bundles a vulnerable version of zlib. I'm gonna fix this too. |
the zlib 1.2.8 issue should be fixed with alpinelinux/aports@655e1b3 I think the false positive for pcre is about to be fixed too, so hopefully it will be all green tomorrow. Thank you for your help solving those! |
@ncopa thank you! This is awesome to hear! What do we need to do at this point moving forward? Do we need to push a new Docker image/create a PR here? If so, how do we do this if we don't have any changes to make with our own Dockerfile? |
We heavily use docker caching for the official image builds, so anything added to the Dockerfile would be a bit of a hack to get it to rebuild starting at the right point. But it looks like there should be a rebuild of the base Alpine images next week (once gliderlabs/docker-alpine#337 gets finished). And once PR'd and merged in official images, will trigger in our build servers to rebuild all dependent images. TL;DR: it should naturally work itself out once we get new Alpine image builds. Hopeful for next week. |
As per above discussion, this PR is not needed. |
No description provided.