8000 Update Dockerfile with nginx hardened image (0 CVEs) by RicardoAReyes · Pull Request #56 · adlnet/CATAPULT · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

Update Dockerfile with nginx hardened image (0 CVEs) #56

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

RicardoAReyes
Copy link

Updated the Dockerfile nginx container image. Instead, we recommend using the latest Chainguard nginx container image, which is free to use, hardened daily, and actively maintained to eliminate CVEs by patching both direct and transitive dependencies.

Recommend using Chainguard's nginx:latest image that is patched daily, 0 CVEs, the transition should be straightforward—and will significantly reduce software supply chain risk and attack surface.

See the difference: https://images.chainguard.dev/directory/image/nginx/compare
Screenshot 2025-05-20 at 2 21 57 PM

Docker
~ grype nginx:alpine
✔ Pulled image
✔ Loaded image nginx:alpine
✔ Parsed image sha256:96868d9fa38f469a86d2f25787e43ee9ad330339d30be260aa9f5a338bb03751
✔ Cataloged contents 4ea77aed1105f06c21b41d8ebcbfbcaa11e6ce07461b8b3bbcee3d70de786b00
├── ✔ Packages [68 packages]
├── ✔ File metadata [978 locations]
├── ✔ Executables [123 executables]
└── ✔ File digests [978 files]
✔ Scanned for vulnerabilities [12 vulnerability matches]
├── by severity: 0 critical, 3 high, 3 medium, 6 low, 0 negligible
└── by status: 2 fixed, 10 not-fixed, 0 ignored

NAME INSTALLED FIXED-IN TYPE VULNERABILITY SEVERITY EPSS% RISK
tiff 4.7.0-r0 apk GHSA-fq8g-55cp-756j Medium 60.80 0.2
tiff 4.7.0-r0 apk GHSA-cx8g-4cf5-cjv3 High 49.60 0.2
tiff 4.7.0-r0 apk GHSA-2j29-7372-8rgg Medium 45.05 0.1
libxml2 2.13.4-r5 2.13.4-r6 apk GHSA-w8fw-fj9q-vcjj High 3.78 < 0.1
libxml2 2.13.4-r5 2.13.4-r6 apk GHSA-mfrm-w63c-3x58 High 1.83 < 0.1
tiff 4.7.0-r0 apk GHSA-4v5g-xjvw-59g6 Medium 2.66 < 0.1
busybox 1.37.0-r12 apk GHSA-wp4q-9jq4-gv74 Low 2.25 < 0.1
busybox-binsh 1.37.0-r12 apk GHSA-wp4q-9jq4-gv74 Low 2.25 < 0.1
ssl_client 1.37.0-r12 apk GHSA-wp4q-9jq4-gv74 Low 2.25 < 0.1
busybox 1.37.0-r12 apk GHSA-rrv5-483w-xmr9 Low 3.11 < 0.1
busybox-binsh 1.37.0-r12 apk GHSA-rrv5-483w-xmr9 Low 3.11 < 0.1
ssl_client 1.37.0-r12 apk GHSA-rrv5-483w-xmr9 Low 3.11 < 0.1

Chainguard
~ grype cgr.dev/chainguard/nginx:latest
✔ Loaded image cgr.dev/chainguard/nginx:latest
✔ Parsed image sha256:989aaf169ed087c46f7ef49d9bcc6c83eebb550ac1b69e379406926feb3232db
✔ Cataloged contents 65b84f245ad3d56efb85362bf4fb83e7ec82b1104ccfeaed8e2c89050c901751
├── ✔ Packages [16 packages]
├── ✔ Executables [33 executables]
├── ✔ File metadata [165 locations]
└── ✔ File digests [165 files]
✔ Scanned for vulnerabilities [0 vulnerability matches]
├── by severity: 0 critical, 0 high, 0 medium, 0 low, 0 negligible
└── by status: 0 fixed, 0 not-fixed, 0 ignored

No vulnerabilities found

Updated the Dockerfile nginx container image. Instead, we recommend using the latest Chainguard nginx container image, which is free to use, hardened daily, and actively maintained to eliminate CVEs by patching both direct and transitive dependencies.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant
0