Commit 1744da1
authored
Add Pixie hydra and kratos images to fix security vulns (upgrade Go and vuln deps) (#2244)
Summary: Add Pixie hydra and kratos images to fix security vulns
(upgrade Go and vuln deps)
Ory's OSS projects are released every ~6 months. This means non
Enterprise customers are stuck running images built with old go versions
and out of date dependencies.
I've split out adding these images with the change to use them since the
upgrade itself requires quite a few changes.
Relevant Issues: N/A
Type of change: /kind dependencies
Test Plan: Skaffold'ed a cloud running these versions and verified auth
functionality works e2e
- [x] Verified images have the critical and high vulnerabilities
addressed
<details><summary>trivy scan</summary>
```
$ trivy image --scanners vuln ghcr.io/pixie-io/hydra:2.3.0-scratch@sha256:cc4503bc8d0f97624e3d6fa004ebda13ef26407b5cc1284191f2958fa93d312c
2025-07-24T18:40:46.806Z INFO Vulnerability scanning is enabled
2025-07-24T18:40:48.552Z INFO Detected OS: debian
2025-07-24T18:40:48.552Z INFO Detecting Debian vulnerabilities...
2025-07-24T18:40:48.552Z INFO Number of language-specific files: 1
2025-07-24T18:40:48.552Z INFO Detecting gobinary vulnerabilities...
ghcr.io/pixie-io/hydra:2.3.0-scratch@sha256:cc4503bc8d0f97624e3d6fa004ebda13ef26407b5cc1284191f2958fa93d312c (debian 12.11)
Total: 0 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0)
usr/bin/hydra (gobinary)
Total: 4 (UNKNOWN: 0, LOW: 1, MEDIUM: 3, HIGH: 0, CRITICAL: 0)
┌───────────────────────────────┬─────────────────────┬──────────┬───────────────────┬───────────────┬────────────────────────────────────────────────────────────┐
│ Library │ Vulnerability │ Severity │ Installed Version │ Fixed Version │ Title │
├───────────────────────────────┼─────────────────────┼──────────┼───────────────────┼───────────────┼────────────────────────────────────────────────────────────┤
│ github.com/cloudflare/circl │ GHSA-2x5j-vhc8-9cwm │ LOW │ v1.3.7 │ 1.6.1 │ CIRCL-Fourq: Missing and wrong validation can lead to │
│ │ │ │ │ │ incorrect results │
│ │ │ │ │ │ GHSA-2x5j-vhc8-9cwm │
├───────────────────────────────┼─────────────────────┼──────────┼───────────────────┼───────────────┼────────────────────────────────────────────────────────────┤
│ github.com/go-jose/go-jose/v3 │ CVE-2025-27144 │ MEDIUM │ v3.0.3 │ 3.0.4 │ go-jose: Go JOSE's Parsing Vulnerable to Denial of Service │
│ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-27144 │
├───────────────────────────────┼─────────────────────┤ ├───────────────────┼───────────────┼────────────────────────────────────────────────────────────┤
│ golang.org/x/net │ CVE-2025-22870 │ │ v0.33.0 │ 0.36.0 │ golang.org/x/net/proxy: golang.org/x/net/http/httpproxy: │
│ │ │ │ │ │ HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net │
│ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22870 │
│ ├─────────────────────┤ │ ├───────────────┼────────────────────────────────────────────────────────────┤
│ │ CVE-2025-22872 │ │ │ 0.38.0 │ golang.org/x/net/html: Incorrect Neutralization of Input │
│ │ │ │ │ │ During Web Page Generation in x/net in... │
│ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22872 │
└───────────────────────────────┴─────────────────────┴──────────┴───────────────────┴───────────────┴────────────────────────────────────────────────────────────┘
$ trivy image --scanners vuln ghcr.io/pixie-io/kratos:1.3.1-scratch@sha256:af0776882c10c3e9137006511c3d4a7aaab2598e75bd86f5692a4a9759da5054
2025-07-24T18:38:18.138Z INFO Vulnerability scanning is enabled
2025-07-24T18:38:20.123Z INFO Detected OS: debian
2025-07-24T18:38:20.123Z INFO Detecting Debian vulnerabilities...
2025-07-24T18:38:20.123Z INFO Number of language-specific files: 1
2025-07-24T18:38:20.123Z INFO Detecting gobinary vulnerabilities...
ghcr.io/pixie-io/kratos:1.3.1-scratch@sha256:af0776882c10c3e9137006511c3d4a7aaab2598e75bd86f5692a4a9759da5054 (debian 12.11)
Total: 0 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0)
usr/bin/kratos (gobinary)
Total: 5 (UNKNOWN: 0, LOW: 0, MEDIUM: 5, HIGH: 0, CRITICAL: 0)
┌───────────────────────────────┬────────────────┬──────────┬───────────────────┬───────────────┬────────────────────────────────────────────────────────────┐
│ Library │ Vulnerability │ Severity │ Installed Version │ Fixed Version │ Title │
├───────────────────────────────┼────────────────┼──────────┼───────────────────┼───────────────┼────────────────────────────────────────────────────────────┤
│ github.com/go-jose/go-jose/v3 │ CVE-2025-27144 │ MEDIUM │ v3.0.3 │ 3.0.4 │ go-jose: Go JOSE's Parsing Vulnerable to Denial of Service │
│ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-27144 │
├───────────────────────────────┤ │ ├───────────────────┼───────────────┤ │
│ github.com/go-jose/go-jose/v4 │ │ │ v4.0.2 │ 4.0.5 │ │
│ │ │ │ │ │ │
├───────────────────────────────┼────────────────┤ ├───────────────────┼───────────────┼────────────────────────────────────────────────────────────┤
│ github.com/golang/glog │ CVE-2024-45339 │ │ v1.2.1 │ 1.2.4 │ github.com/golang/glog: Vulnerability when creating log │
│ │ │ │ │ │ files in github.com/golang/glog │
│ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-45339 │
├───────────────────────────────┼────────────────┤ ├───────────────────┼───────────────┼────────────────────────────────────────────────────────────┤
│ golang.org/x/net │ CVE-2025-22870 │ │ v0.27.0 │ 0.36.0 │ golang.org/x/net/proxy: golang.org/x/net/http/httpproxy: │
│ │ │ │ │ │ HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net │
│ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22870 │
│ ├────────────────┤ │ ├───────────────┼────────────────────────────────────────────────────────────┤
│ │ CVE-2025-22872 │ │ │ 0.38.0 │ golang.org/x/net/html: Incorrect Neutralization of Input │
│ │ │ │ │ │ During Web Page Generation in x/net in... │
│ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2025-22872 │
└───────────────────────────────┴────────────────┴──────────┴───────────────────┴───────────────┴────────────────────────────────────────────────────────────┘
```
</details>
---------
Signed-off-by: Dom Del Nano <ddelnano@gmail.com>1 parent 2464dce commit 1744da1
File tree
3 files changed
+136
-0
lines changed- tools/docker
- hydra_image
- kratos_image
3 files changed
+136
-0
lines changed| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
119 | 119 | | |
120 | 120 | | |
121 | 121 | | |
| 122 | + | |
| 123 | + | |
| 124 | + | |
| 125 | + | |
| 126 | + | |
| 127 | + | |
122 | 128 | | |
123 | 129 | | |
124 | 130 | | |
| |||
276 | 282 | | |
277 | 283 | | |
278 | 284 | | |
| 285 | + | |
| 286 | + | |
| 287 | + | |
| 288 | + | |
| 289 | + | |
| 290 | + | |
| 291 | + | |
| 292 | + | |
| 293 | + | |
| 294 | + | |
| 295 | + | |
| 296 | + | |
| 297 | + | |
| 298 | + | |
| 299 | + | |
| 300 | + | |
| 301 | + | |
| 302 | + | |
279 | 303 | | |
280 | 304 | | |
281 | 305 | | |
| |||
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
| 1 | + | |
| 2 | + | |
| 3 | + | |
| 4 | + | |
| 5 | + | |
| 6 | + | |
| 7 | + | |
| 8 | + | |
| 9 | + | |
| 10 | + | |
| 11 | + | |
| 12 | + | |
| 13 | + | |
| 14 | + | |
| 15 | + | |
| 16 | + | |
| 17 | + | |
| 18 | + | |
| 19 | + | |
| 20 | + | |
| 21 | + | |
| 22 | + | |
| 23 | + | |
| 24 | + | |
| 25 | + | |
| 26 | + | |
| 27 | + | |
| 28 | + | |
| 29 | + | |
| 30 | + | |
| 31 | + | |
| 32 | + | |
| 33 | + | |
| 34 | + | |
| 35 | + | |
| 36 | + | |
| 37 | + | |
| 38 | + | |
| 39 | + | |
| 40 | + | |
| 41 | + | |
| 42 | + | |
| 43 | + | |
| 44 | + | |
| 45 | + | |
| 46 | + | |
| 47 | + | |
| 48 | + | |
| 49 | + | |
| 50 | + | |
| 51 | + | |
| 52 | + | |
| 53 | + | |
| 54 | + | |
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
| 1 | + | |
| 2 | + | |
| 3 | + | |
| 4 | + | |
| 5 | + | |
| 6 | + | |
| 7 | + | |
| 8 | + | |
| 9 | + | |
| 10 | + | |
| 11 | + | |
| 12 | + | |
| 13 | + | |
| 14 | + | |
| 15 | + | |
| 16 | + | |
| 17 | + | |
| 18 | + | |
| 19 | + | |
| 20 | + | |
| 21 | + | |
| 22 | + | |
| 23 | + | |
| 24 | + | |
| 25 | + | |
| 26 | + | |
| 27 | + | |
| 28 | + | |
| 29 | + | |
| 30 | + | |
| 31 | + | |
| 32 | + | |
| 33 | + | |
| 34 | + | |
| 35 | + | |
| 36 | + | |
| 37 | + | |
| 38 | + | |
| 39 | + | |
| 40 | + | |
| 41 | + | |
| 42 | + | |
| 43 | + | |
| 44 | + | |
| 45 | + | |
| 46 | + | |
| 47 | + | |
| 48 | + | |
| 49 | + | |
| 50 | + | |
| 51 | + | |
| 52 | + | |
| 53 | + | |
| 54 | + | |
| 55 | + | |
| 56 | + | |
| 57 | + | |
| 58 | + | |
0 commit comments