-
Notifications
You must be signed in to change notification settings - Fork 130
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
laradock/php-fpm:2.2-7.2 CVE-2019-11043 Issue #35
Comments
(I think) Laradock is not exploitable by default.
So when looking at the nginx default.conf laradock is not vulnerable, BUT it will be a GOOD idea to update it. |
Thanks @jrbecart. I agree with your assessment which is why I have left it unpatched at the moment (vs. creating my own base image). But as you said, it would be a good idea to update it anyway. And since from what I can tell, there isn't really any work except to re-run the build, I thought this issue would turnaround quickly. |
Temporarily, if someone needs the updated image, you can find it here (forked from this repo). I set it up in docker hub to rebuild the images automatically if the base image is updated. |
now, auto build and push image to docker hub every week. |
Referencing: https://thehackernews.com/2019/10/nginx-php-fpm-hacking.html?m=1
According to the referenced article, there is a new vulnerability (CVE-2019-11043) which has been patched in PHP 7.2.24. At this time, laradock/php-fpm:2.2-7.2 is on PHP 7.2.21.
Would we be able to get a new Docker image with this updated? It appears that since the
Dockerfile
usesFROM php:7.2-fpm
, all you need to do is re-run the build as php has already has pushed the patch.The text was updated successfully, but these errors were encountered: