CVE-2019-5021: Fix "DISABLE_ROOT_PASSWD" default value for build "options" files#511
CVE-2019-5021: Fix "DISABLE_ROOT_PASSWD" default value for build "options" files#511myoung34 wants to merge 1 commit intogliderlabs:masterfrom
Conversation
|
I'm kind of confused here: $ docker pull alpine:3.9
3.9: Pulling from library/alpine
Digest: sha256:28ef97b8686a0b5399129e9b763d5b7e5ff03576aa5580d6f4182a49c5fe1913
Status: Image is up to date for alpine:3.9
$ docker run --rm alpine:3.9 grep '^root:' /etc/passwd
root:x:0:0:root:/root:/bin/ash
$ docker run --rm alpine:3.9 grep '^root:' /etc/shadow
root:!::0:::::The See https://manpages.debian.org/stretch/passwd/passwd.5.en.html and https://manpages.debian.org/stretch/passwd/shadow.5.en.html. 😕 |
|
Also, we (the official images team) have a test for this very case: https://github.com/docker-library/official-images/blob/23ebab2fae500594ca85c7878b0fbd8bab27dfda/test/tests/no-hard-coded-passwords/run.sh 😕 |
|
I suppose it makes sense to adjust that test to balk at an empty password for |
|
|
Looking at https://hub.docker.com/_/alpine, 3.2, 3.3, and 3.4 aren't actually supported anymore. 😕 |
|
And looking at https://wiki.alpinelinux.org/wiki/Alpine_Linux:Releases, they're long-since EOL now (3.4 back on 2018-05-01). |
|
3.5 was EOL back in 2018-11-01. |
|
Updated |
|
This is a duplicate of #430 and was fixed in docker-library/official-images#5516. |
|
As said, # make sure root login is disabled
RUN sed -i -e 's/^root::/root:!:/' /etc/shadowBut, again, this is only a problem if:
|
|
@ncopa i'm trying to ascertain if user is installing openssh whether the sshd_config will start using PAM. From what I can see, this particular patch seems to show that "UsePAM no" is commented out. https://git.alpinelinux.org/aports/tree/main/openssh/disable-forwarding-by-default.patch |
what's the problem then? why isn't the PR closed yet? @yosifkit Let's break 3495734985734985 docker builds by merging this PR.... |
|
The official alpine images have moved to https://github.com/alpinelinux/docker-alpine nowdays, so this PR will not affect the official images. This PR can be kept open for the gliderlabs images. |
No, the The comment in the configuration shows the default, which means that |
I am seeing a few of the CVE details stating that even the non-EOL are affected, including v3.9. Is there different test script or images being tested ? @ncopa @tianon https://talosintelligence.com/vulnerability_reports/TALOS-2019-0782 |
That test was run 7 Feb. The images was updated March 7. |
According to the write up there has been an issue with a missing
-dflag in the build options files starting with Alpine 3.3 that caused the images to go out withroot::instead ofroot:!:This remedies that