@@ -16,8 +16,6 @@ FROM nginx:1.23.2 AS debian
1616RUN --mount=type=bind,from=opentracing-lib,target=/tmp/ot/ \
1717 apt-get update \
1818 && apt-get install --no-install-recommends --no-install-suggests -y libcap2-bin \
19- # temp fix for CVE-2022-40674
20- && apt-get install -y libexpat1 \
2119 && rm -rf /var/lib/apt/lists/* \
2220 && cp -av /tmp/ot/usr/local/lib/libopentracing.so* /tmp/ot/usr/local/lib/libjaegertracing*so* /tmp/ot/usr/local/lib/libzipkin*so* /tmp/ot/usr/local/lib/libdd*so* /tmp/ot/usr/local/lib/libyaml*so* /usr/local/lib/ \
2321 && cp -av /tmp/ot/usr/lib/nginx/modules/ngx_http_opentracing_module.so /usr/lib/nginx/modules/ \
@@ -29,8 +27,6 @@ FROM nginx:1.23.2-alpine AS alpine
2927
3028RUN --mount=type=bind,from=alpine-opentracing-lib,target=/tmp/ot/ \
3129 apk add --no-cache libcap libstdc++ \
32- # temp fix for CVE-2022-3209 and CVE-2022-35252
33- && apk upgrade --no-cache libxml2 curl libcurl \
3430 && cp -av /tmp/ot/usr/local/lib/libopentracing.so* /tmp/ot/usr/local/lib/libjaegertracing*so* /tmp/ot/usr/local/lib/libzipkin*so* /tmp/ot/usr/local/lib/libdd*so* /tmp/ot/usr/local/lib/libyaml*so* /usr/local/lib/ \
3531 && cp -av /tmp/ot/usr/lib/nginx/modules/ngx_http_opentracing_module.so /usr/lib/nginx/modules/ \
3632 && ldconfig /usr/local/lib/
@@ -90,8 +86,6 @@ RUN --mount=type=secret,id=nginx-repo.crt,dst=/etc/ssl/nginx/nginx-repo.crt,mode
9086 && printf "%s\n " "deb https://pkgs.nginx.com/app-protect/${NGINX_PLUS_VERSION}/debian ${DEBIAN_VERSION} nginx-plus" \
9187 "deb https://pkgs.nginx.com/app-protect-security-updates/debian ${DEBIAN_VERSION} nginx-plus" > /etc/apt/sources.list.d/nginx-app-protect.list \
9288 && apt-get update \
93- # temp fix for CVE-2022-37434 and DLA-3112-1
94- && apt-get install zlib1g libbz2-1.0 \
9589 && apt-get install --no-install-recommends --no-install-suggests -y app-protect app-protect-attack-signatures app-protect-threat-campaigns \
9690 && apt-get purge --auto-remove -y curl; \
9791 fi \
@@ -125,6 +119,9 @@ LABEL name="NGINX Ingress Controller" \
125119
126120COPY --link --chown=101:0 LICENSE /licenses/
127121
122+ # temp fix for CVE-2022-27404, CVE-2022-33099 and CVE-2022-37434
123+ RUN microdnf --nodocs upgrade -y freetype lua-libs zlib
124+
128125
129126# ############################################ Base image for UBI with NGINX Plus #############################################
130127FROM redhat/ubi8 AS ubi-plus
@@ -134,6 +131,8 @@ SHELL ["/bin/bash", "-o", "pipefail", "-c"]
134131RUN --mount=type=secret,id=nginx-repo.crt,dst=/etc/ssl/nginx/nginx-repo.crt,mode=0644 \
135132 --mount=type=secret,id=nginx-repo.key,dst=/etc/ssl/nginx/nginx-repo.key,mode=0644 \
136133 dnf --nodocs install -y shadow-utils ca-certificates \
134+ # temp fix for CVE-2022-1304 and CVE-2016-3709
135+ && dnf --nodocs install -y libcom_err libxml2 \
137136 && groupadd --system --gid 101 nginx \
138137 && useradd --system --gid nginx --no-create-home --home-dir /nonexistent --comment "nginx user" --shell /bin/false --uid 101 nginx \
139138 && rpm --import https://cs.nginx.com/static/keys/nginx_signing.key \
0 commit comments