question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

Provide already imported fresh CVE Database as daily built Docker image for direct use

See original GitHub issue

Is your feature request related to a problem? Please describe.

We operate a large “on premise” CI platform. Each job is independent (specific Maven repo, specific CVE database, …) We are trying to find a reliable way to share the CVE database (we have tried with a separate H2 database, common MySQL / PostgreSQL database, etc.)

Describe the solution you’d like

The most efficient way we have tried is to give a Docker container that includes the already imported CVE database. This image is built/updated daily with fresh CVE metadatas.

An example of Dockerfile to create this image: https://github.com/jycr/docker-dependency-check-with-db/blob/main/Dockerfile

Docker image versioning can follow rule : X.X.X.YYYYYYYYYYYY where:

  • X.X.X is dependency-check version
  • YYYYYYYYYYYY is timestamp of CVE database.

A customer can directly use this image, or customize this own with a multistage Dockerfile. Ex:

FROM jycr/dependency-check-with-db:latest as dependency-check

FROM maven:3.8-jdk-11-slim

# Installation of Git in order to be able to release via the Jenkins pipeline
RUN apt-get update && \
    apt-get install --assume-yes --no-install-recommends \
        git \
        && \
    rm -rf /var/lib/apt/lists/* && \
    mkdir -p /usr/share

COPY --from=dependency-check /usr/share/dependency-check /usr/share/dependency-check

Benefits:

  • No need to download CVE metadatas from NIST as it is already available in the database provided with this custom Docker image
  • No time spent updating the database: the CVE database included in the Docker image is already updated
  • The Docker image is available on the large Docker Hub CDN (much more available than the NIST website for uploading metadata files)
  • Each customer can create their own build context with a custom Dockerfile and copy the CVE database, or can directly use that custom Docker image. With the Docker cache system, it’s really fast.

Issue Analytics

  • State:closed
  • Created 2 years ago
  • Reactions:4
  • Comments:9 (4 by maintainers)

github_iconTop GitHub Comments

1reaction
jeremylongcommented, May 28, 2021

The requested docker image already exists. It was created by @javixeneize for use in the dependency-check action in the marketplace: https://github.com/marketplace/actions/dependency-check

https://hub.docker.com/r/owasp/dependency-check-action

The issues with the image:

  • @mprins is right - depending on your use case there are defiantly rate limits imposed by dockerhub.
  • GitHub disables the cron build jobs that keeps the dependency-check-action image updated after 60 days of no activity in the repo. I’ve emailed @javixeneize and will discuss possible solutions.
0reactions
jycrcommented, May 29, 2021

We successful used “latest” image from: https://hub.docker.com/r/owasp/dependency-check-action I close this issue now because only one version on dependency-check is supported. Thank you for your previous feedbacks on this ticket.

Read more comments on GitHub >

github_iconTop Results From Across the Web

Vulnerability scanning for Docker local images
Vulnerability scanning for Docker local images allows developers and development teams to review the security state of the container images and take actions ......
Read more >
Take actions to improve security in your Docker images - Snyk
With a multi-stage build, you can use multiple images and selectively copy only the artifacts needed from a particular image. You can use...
Read more >
Containers For Deep Learning Frameworks User Guide
Containers allow use of multiple different deep learning frameworks, which may have ... Issue the docker images command to list the images on...
Read more >
Container Scanning - GitLab Docs
Build and push the Docker image to your project's container registry. If you're using a third-party container registry, you might need to provide...
Read more >
Docker Anti Patterns - Codefresh
In this article, we'll present several bad practices with container usage and the solution to each one.
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found