-
Notifications
You must be signed in to change notification settings - Fork 455
Docker image has vulnerabilities #95
Comments
apt-get remove ncurses |
@graingert Thank you. Just to be clear since I am a bit new to this world, I would take the dockerfile (https://github.com/tianon/docker-brew-ubuntu-core/blob/a2573609340194bf33712c1fa2dc4de8f9b70ca2/zesty/Dockerfile) of the ubuntu 17.0.4 image, and add apt-get remove ncurses command. Is this correct? FROM scratch |
No do
But I'm not sure if that will leave you with a working Ubuntu |
Sure. But there are critical vulnerabilities listed below in docker hub scans and our infra org would not allow to install the image with critical vulnerabilities. ncurses 6.0+20160625-1ubuntu1 |
Yeah so you remove ncurses from the image in a new layer |
Do you think dockerhub will still report the vulnerabilities since they existed in the first layer? |
Who cares, you know there's no vulnerabilities because you just uninstalled them. You're misinterpreting your tools if you think you shouldn't use an image you know is secure |
I agree. Thanks again. I will work on it and convince the security org. |
As has been pointed out to you at least three times now (https://twitter.com/kulprasanna/status/900389125710385152, #90 (comment), and now here), this is not an actionable issue -- unless package updates are provided, there's nothing we can do. A few more useful questions would include:
The situation is a highly nuanced one, and just knowing that ABC image contains packages or binaries which are "vulnerable" to CVEs X, Y, and Z is often simply noise. If there are updated packages available, this image will be updated. In the future, requests for help would be better suited to the Docker Community Forums, the Docker Community Slack, or Stack Overflow. GitHub issues should be reserved for (fixable) problems with the image itself, and requests to the personal Twitter accounts of image maintainers are certainly out of place. Additionally, if your organization requires professional assistance, there are a number of Authorized Docker Partners who should be able to help. Thanks! |
@tianon thank you. This is very helpful. |
Hi
Our client is buying a product implemented on docker containers. It uses ubuntu's official docker images. Our infra org is not allowing the product because the image has vulnerabilities.
I see that vulnerabilities are in packages such as ncurses. We are not using ncurses. How could we remove those vulnerabilities. Please help.
The text was updated successfully, but these errors were encountered: