Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Malicious docker layer in updated docker image for deployment manifest for kind #11612

Closed
v-ware opened this issue Jul 15, 2024 · 7 comments · Fixed by #11617
Closed

Malicious docker layer in updated docker image for deployment manifest for kind #11612

v-ware opened this issue Jul 15, 2024 · 7 comments · Fixed by #11617
Labels
kind/support Categorizes issue or PR as a support question. needs-priority needs-triage Indicates an issue or PR lacks a `triage/foo` label and requires one.

Comments

@v-ware
Copy link

v-ware commented Jul 15, 2024

We are unable to pull the latest docker images in the deployment manifest for kind due to the presence of a malicious docker layer.

corrupted

image

we use this link to access the manifest

https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/deploy/static/provider/kind/deploy.yaml

Virustotal scan of the malicious docker layer

https://www.virustotal.com/gui/file/e01108844c75b2e32f1da70532071698d23baae10b8978be6246bbd34e705e27/detection

image

this started to happen with the recent changes in the images last week

b6fa279#diff-04e9b7595b4502c5c2ac7e44a853ecfbdbeb5c5b73ec18895bea00204a21eede

Can this be checked as we are blocked with the kubernetes deployment of our application?

@v-ware v-ware added the kind/bug Categorizes issue or PR as related to a bug. label Jul 15, 2024
@k8s-ci-robot k8s-ci-robot added the needs-triage Indicates an issue or PR lacks a `triage/foo` label and requires one. label Jul 15, 2024
@k8s-ci-robot
Copy link
Contributor

This issue is currently awaiting triage.

If Ingress contributors determines this is a relevant issue, they will accept it by applying the triage/accepted label and provide further guidance.

The triage/accepted label can be added by org members by writing /triage accepted in a comment.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@longwuyuan
Copy link
Contributor

longwuyuan commented Jul 15, 2024

/remove-kind bug
/kind support

Since the number of scanners out there is too many and the real practical high-priority actionable vulnerabilities are presented closer to the exposure in the data path , the project relies on tools like grype and a maybe couple of others for actionable feedback. For example please look at this

% grype registry.k8s.io/ingress-nginx/controller:v1.11.0@sha256:a886e56d532d1388c77c8340261149d974370edca1093af4c97a96fb1467cb39
 ✔ Vulnerability DB                [updated]  
 ✔ Pulled image                    
 ✔ Loaded image                                                   registry.k8s.io/ingress-ng
 ✔ Parsed image                    sha256:bcb840ba02d3eb300b1c13876604e4286794e5873eacbb86  
 ✔ Cataloged contents              b4ae832d14f2ee33eeb89992fa5af7492bfd74e797e94d1b59fb70b  
   ├── ✔ Packages                        [210 packages]  
   ├── ✔ File digests                    [783 files]  
   ├── ✔ File metadata                   [783 locations]  
   └── ✔ Executables                     [214 executables]  
 ✔ Scanned for vulnerabilities     [7 vulnerability matches]  
   ├── by severity: 0 critical, 3 high, 4 medium, 0 low, 0 negligible
   └── by status:   0 fixed, 7 not-fixed, 0 ignored 
NAME    INSTALLED  FIXED-IN  TYPE       VULNERABILITY   SEVERITY 
nginx   1.25.5               binary     CVE-2024-35200  Medium    
nginx   1.25.5               binary     CVE-2024-34161  Medium    
nginx   1.25.5               binary     CVE-2024-32760  Medium    
nginx   1.25.5               binary     CVE-2024-31079  Medium    
stdlib  go1.22.4             go-module  CVE-2024-24791  High

The issue description is referring to a layer of the image and that is not actionable.

Also there are false-positives involved in the scanning process.

@k8s-ci-robot k8s-ci-robot added kind/support Categorizes issue or PR as a support question. and removed kind/bug Categorizes issue or PR as related to a bug. labels Jul 15, 2024
@zeeZ
Copy link
Contributor

zeeZ commented Jul 15, 2024

The scanners are triggered by files in /etc/nginx/owasp-modsecurity-crs/tests/regression/tests/.

It looks like those test files were previously excluded. Maybe their path changed during a module upgrade?

rm -rf /etc/nginx/owasp-modsecurity-crs/util/regression-tests

rm -rf /etc/nginx/owasp-modsecurity-crs/util/regression-tests

@longwuyuan
Copy link
Contributor

Post a CVE link

@strongjz
Copy link
Member

We did upgrade the nginx build to 1.25.5 and #11511

@zeeZ
Copy link
Contributor

zeeZ commented Jul 19, 2024

@v-ware the offending files should be gone now with 1.10.3/1.11.1

@v-ware
Copy link
Author

v-ware commented Jul 22, 2024

@zeeZ yes, we are able to install 1.11.1 without any issue now. Thanks for your help.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/support Categorizes issue or PR as a support question. needs-priority needs-triage Indicates an issue or PR lacks a `triage/foo` label and requires one.
Projects
Development

Successfully merging a pull request may close this issue.

5 participants