Update Dockerfile with nginx hardened image (0 CVEs) #56
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Updated the Dockerfile nginx container image. Instead, we recommend using the latest Chainguard nginx container image, which is free to use, hardened daily, and actively maintained to eliminate CVEs by patching both direct and transitive dependencies.
Recommend using Chainguard's nginx:latest image that is patched daily, 0 CVEs, the transition should be straightforward—and will significantly reduce software supply chain risk and attack surface.
See the difference: https://images.chainguard.dev/directory/image/nginx/compare

Docker
~ grype nginx:alpine
✔ Pulled image
✔ Loaded image nginx:alpine
✔ Parsed image sha256:96868d9fa38f469a86d2f25787e43ee9ad330339d30be260aa9f5a338bb03751
✔ Cataloged contents 4ea77aed1105f06c21b41d8ebcbfbcaa11e6ce07461b8b3bbcee3d70de786b00
├── ✔ Packages [68 packages]
├── ✔ File metadata [978 locations]
├── ✔ Executables [123 executables]
└── ✔ File digests [978 files]
✔ Scanned for vulnerabilities [12 vulnerability matches]
├── by severity: 0 critical, 3 high, 3 medium, 6 low, 0 negligible
└── by status: 2 fixed, 10 not-fixed, 0 ignored
NAME INSTALLED FIXED-IN TYPE VULNERABILITY SEVERITY EPSS% RISK
tiff 4.7.0-r0 apk GHSA-fq8g-55cp-756j Medium 60.80 0.2
tiff 4.7.0-r0 apk GHSA-cx8g-4cf5-cjv3 High 49.60 0.2
tiff 4.7.0-r0 apk GHSA-2j29-7372-8rgg Medium 45.05 0.1
libxml2 2.13.4-r5 2.13.4-r6 apk GHSA-w8fw-fj9q-vcjj High 3.78 < 0.1
libxml2 2.13.4-r5 2.13.4-r6 apk GHSA-mfrm-w63c-3x58 High 1.83 < 0.1
tiff 4.7.0-r0 apk GHSA-4v5g-xjvw-59g6 Medium 2.66 < 0.1
busybox 1.37.0-r12 apk GHSA-wp4q-9jq4-gv74 Low 2.25 < 0.1
busybox-binsh 1.37.0-r12 apk GHSA-wp4q-9jq4-gv74 Low 2.25 < 0.1
ssl_client 1.37.0-r12 apk GHSA-wp4q-9jq4-gv74 Low 2.25 < 0.1
busybox 1.37.0-r12 apk GHSA-rrv5-483w-xmr9 Low 3.11 < 0.1
busybox-binsh 1.37.0-r12 apk GHSA-rrv5-483w-xmr9 Low 3.11 < 0.1
ssl_client 1.37.0-r12 apk GHSA-rrv5-483w-xmr9 Low 3.11 < 0.1
Chainguard
~ grype cgr.dev/chainguard/nginx:latest
✔ Loaded image cgr.dev/chainguard/nginx:latest
✔ Parsed image sha256:989aaf169ed087c46f7ef49d9bcc6c83eebb550ac1b69e379406926feb3232db
✔ Cataloged contents 65b84f245ad3d56efb85362bf4fb83e7ec82b1104ccfeaed8e2c89050c901751
├── ✔ Packages [16 packages]
├── ✔ Executables [33 executables]
├── ✔ File metadata [165 locations]
└── ✔ File digests [165 files]
✔ Scanned for vulnerabilities [0 vulnerability matches]
├── by severity: 0 critical, 0 high, 0 medium, 0 low, 0 negligible
└── by status: 0 fixed, 0 not-fixed, 0 ignored
No vulnerabilities found