-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Malicious docker layer in updated docker image for deployment manifest for kind #11612
Comments
This issue is currently awaiting triage. If Ingress contributors determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/remove-kind bug Since the number of scanners out there is too many and the real practical high-priority actionable vulnerabilities are presented closer to the exposure in the data path , the project relies on tools like grype and a maybe couple of others for actionable feedback. For example please look at this
The issue description is referring to a layer of the image and that is not actionable. Also there are false-positives involved in the scanning process. |
The scanners are triggered by files in It looks like those test files were previously excluded. Maybe their path changed during a module upgrade?
ingress-nginx/images/nginx/rootfs/build.sh Line 738 in 125ffd4
|
Post a CVE link |
We did upgrade the nginx build to 1.25.5 and #11511 |
@v-ware the offending files should be gone now with 1.10.3/1.11.1 |
@zeeZ yes, we are able to install 1.11.1 without any issue now. Thanks for your help. |
We are unable to pull the latest docker images in the deployment manifest for kind due to the presence of a malicious docker layer.
we use this link to access the manifest
https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/deploy/static/provider/kind/deploy.yaml
Virustotal scan of the malicious docker layer
https://www.virustotal.com/gui/file/e01108844c75b2e32f1da70532071698d23baae10b8978be6246bbd34e705e27/detection
this started to happen with the recent changes in the images last week
b6fa279#diff-04e9b7595b4502c5c2ac7e44a853ecfbdbeb5c5b73ec18895bea00204a21eede
Can this be checked as we are blocked with the kubernetes deployment of our application?
The text was updated successfully, but these errors were encountered: