-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Latest vulnerability fixes #30
Conversation
1. Package ip had vulnerabilities. Upgrading node-alpine docker image to latest available version. This node image does not contain the ip package at all. Additionally, the latest ip version 2.0.1 might not contain the remediation as yet.
@Abby-Wheelis for visibility into DevOps changes |
@MukuFlash03 I am fine with making this change, but I am a bit confused by the update.
Given this, is the vulnerability fixed or not? |
Alright, I understand the confusion and thank you clarifying the difference in the OS level packages. and npm packages. The one I mentioned was what I used for OS packages for one of the earlier vulnerabilities for openssl package. Coming to the actual vulnerability, it is in the ip package and this is the CVE link. AWS inspector mentions the affected version as 2.0.0 for the ip package. Now I'm listing three node docker images related to this:
Hence, I decided to finalize the latest 21.7.2 alpine image. So, the question really is whether ip package is being used by us in the code? Will its absence in the latest docker image affect us? |
@MukuFlash03 I still don't understand the difference in packages between images, but 21.7.2 should be fine. Please remember to move the issue back after you are done addressing comments!
I do not believe we use any OS packages directly. So as long as the libraries that use the OS packages have been fixed, we are fine. And if not, that is what staging is for. Ideally, we would have some basic automated testing in place to help test before staging as well, but that is a separate task |
So, as I mentioned here that the command I initially mentioned (apk list...) was incorrect and is for OS packages as you pointed out. While, the vulnerable package (ip v. 2.0.0) is in fact a npm package and not an OS package. Now, as I mentioned, 21.7.2 node alpine image doesn't contain the ip package at all. |
Summary
1 CRITICAL package - ip
This node image does not contain the ip package at all. Additionally, the latest ip version 2.0.1 might not contain the remediation as yet.
DETAILS
Packages present in:
$ cd /usr/local/lib/node_modules/npm/node_modules
Checked packages list and version number using:
$ apk info
$ apk list -i | grep ip
Upgraded base node image to latest version - node:21.7.2-alpine
Findings:
Initially, a new node-alpine version was released but it had only 23 packages while originally the previous node images had 240 packages.
The official github repo for ip package shows updated version.
However, the latest update version 2.0.1 might not be safe as mentioned in this stackoverflow post.
Now, another newer version is available which has 233 packages but no ip package.
This package has an ip-address package though which was not there in the previous node image version.
NPM ip: https://www.npmjs.com/package/ip
NPM ip-address: https://www.npmjs.com/package/ip-address
So going ahead with this as this is the latest node image version available without any vulnerabilties.