Skip to content

Could we remove curl from nginx images (again)? #681

Closed
@sambernet

Description

Recently when I removed curl from our own, derived nginx images, I was quite suprised to learn the base image actually contains curl already since the upgrade to 1.18.0. This was added as a fix for #378

I was trying to remove curl from our images, as there is no really good reason for it to be in a web server image in the first place (we were previously using it for health checks only), and it also triggers a range of security scanning reports with High severity. See for example a snyk report for current version. This has actually been reported as an issue also: #657
I am aware that those are false positives, but I would prefer a basic webserver image to come "as clean as possible" - now everybody scanning any derived image for vulnerabilities will have to deal with this in some way or the other.

But while it's easy to add curl (or wget for the sake of it) to an upstream base image like your nginx images, it is not actually possible to my knowledge to remove it. Yes, we can apt-get remove it and thus hide it, but it has still been installed as one of those immutable layers in the image...

Note that the same issue was actually also brought up by @hsblhsn for the unprivileged image here, but closed for the time being.

In fact the unprivileged image is also my main focus, but as those two images are closely related, I use both and this one here gets more attention, I figured I'd rather have this discussed here 😉

So could we maybe reconsider this decision?

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions