-
Notifications
You must be signed in to change notification settings - Fork 157
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Automatically rebuild images when detecting "critical" CVEs #136
Comments
Did you pull the latest image released this AM? The issue should have been fixed. Also, for future reference, I would appreciate if you open a new issue if you think there's a security issue (assuming it qualifies per the Security guidelines) 😄 |
I wonder if the new image build includes running security update e.g., |
See #174 for my answer 🙂 |
Is your feature request related to a problem? Please describe
CVEs are routinely posted for these images. Most of them do not affect NGINX directly, but that's not always the case.
Describe the solution you'd like
We should scan for CVEs on a daily basis and flag any relevant CVEs as critical (CVEs with a critical severity that directly impact NGINX or a package used by NGINX). Should any critical CVEs be flagged, we should check if a fix for the CVEs is available, and if so, immediately rebuild the relevant images.
Additional context
As of today, Docker builds are cached using the GitHub Actions cache. The base Alpine/Debian images are not necessarily rebuilt/pushed when a new CVE is found and fixed, so we might need to wipe the GitHub Actions cache before rebuilding any relevant images. See #137 for tracking info.
Tasks
The text was updated successfully, but these errors were encountered: