-
Notifications
You must be signed in to change notification settings - Fork 693
Outdated distroless base image version has many CVEs #2204
Comments
I'd be a big fan of requiring users to set an explicit |
@sudoforge did you submit a PR. is your proposal to let users specify the distroless base inter WORKSPACE (repository rule) or on each xx_image rule? |
What about a release with freshly bumped base to buy some time. In the current form the rules are unusable :/ |
FWIW, rules_oci has convenient logic for you just specify |
This issue has been automatically marked as stale because it has not had any activity for 180 days. It will be closed if no further activity occurs in 30 days. |
The issue is still there, but we've switched to rules_oci entirely. |
🐞 bug report
Affected Rule
The issue affects
go_image
,cc_image
and probably other*_image
s.Is this a regression?
Not really.
Description
The current release v0.25.0 references old versions of distroless base images (2021-12). Users who are building off the default base images are inadvertently using 1+ year old distroless that contain many CVEs. Specifically, this affects users who are copy-pasting
And not specifying a
base = ...
in theirgo_image
.Please release a new version of
rules_docker
with updated the distroless image version.Alternatively, remove
repositories()
fromgo:image.bzl
and others. This will mean that users will have to explicitly specify abase
image/version.🔬 Minimal Reproduction
Follow the instructions on https://github.com/bazelbuild/rules_docker#go_image to build a
go_image
without specifying abase = ...
Upload the
go_image
to Google Container Repository.🔥 Exception or Error
Google Container Repository reports the following CVEs:
CVE-2022-1292 Critical 10 Yes openssl OS
CVE-2022-2068 Critical 10 Yes openssl OS
CVE-2022-23219 High 7.5 Yes glibc OS
CVE-2021-3999 High 7.8 Yes glibc OS
CVE-2021-33574 High 7.5 Yes glibc OS
CVE-2022-23218 High 7.5 Yes glibc OS
CVE-2021-4160 Medium 4.3 Yes openssl OS
CVE-2022-2097 Medium 5 – openssl OS
CVE-2022-0778 Medium 5 Yes openssl OS
CVE-2019-1010023 Low 6.8 – glibc OS
CVE-2021-43396 Low 5 Yes glibc OS
CVE-2019-1010022 Low 7.5 – glibc OS
CVE-2018-20796 Low 5 – glibc OS
CVE-2010-0928 Low 4 – openssl OS
CVE-2007-6755 Low 5.8 – openssl OS
CVE-2019-9192 Low 5 – glibc OS
CVE-2010-4756 Low 4 – glibc OS
CVE-2019-1010024 Low 5 – glibc OS
CVE-2019-1010025 Low 5 – glibc OS
🌍 Your Environment
Operating System:
Output of
bazel version
:Rules_docker version:
Anything else relevant?
The text was updated successfully, but these errors were encountered: