Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release schedule for Debian security upgrades #14813

Closed
nemobis opened this issue Jun 9, 2023 · 3 comments
Closed

Release schedule for Debian security upgrades #14813

nemobis opened this issue Jun 9, 2023 · 3 comments

Comments

@nemobis
Copy link

nemobis commented Jun 9, 2023

How often are Debian-based official images updated to pick up security releases? Quite often I see official images which are several weeks out of date. It would be nice to have images refreshed once a new Debian security update is released, let's say within 24 hours.

We mirror the official images internally in our own registry, but trivy often detects vulnerable versions. For example right now the node:slim image is 17 days old and ships a vulnerable version of openssl which was upgraded 10 days ago:

[2023-05-31] Accepted openssl 1.1.1n-0+deb11u5 (source) into stable-security (Debian FTP Masters) (signed by: Sebastian Andrzej Siewior)

So vulnerability scanners (including Docker Hub's own!) complain about CVE-2023-0464:

2023-06-09T08:19:33.747Z	INFO	Detecting node-pkg vulnerabilities...
node:20-bullseye-slim.tar (debian 11.7)
=======================================
Total: 2 (HIGH: 2, CRITICAL: 0)
┌───────────┬───────────────┬──────────┬───────────────────┬──────────────────┬────────────────────────────────────────────────────────────┐
│  Library  │ Vulnerability │ Severity │ Installed Version │  Fixed Version   │                           Title                            │
├───────────┼───────────────┼──────────┼───────────────────┼──────────────────┼────────────────────────────────────────────────────────────┤
│ libssl1.1 │ CVE-2023-0464 │ HIGH     │ 1.1.1n-0+deb11u4  │ 1.1.1n-0+deb11u5 │ Denial of service by excessive resource usage in verifying │
│           │               │          │                   │                  │ X509 policy constraints...                                 │
│           │               │          │                   │                  │ https://avd.aquasec.com/nvd/cve-2023-0464                  │
│           ├───────────────┤          │                   │                  ├────────────────────────────────────────────────────────────┤
│           │ CVE-2023-2650 │          │                   │                  │ Possible DoS translating ASN.1 object identifiers          │
│           │               │          │                   │                  │ https://avd.aquasec.com/nvd/cve-2023-2650                  │
└───────────┴───────────────┴──────────┴───────────────────┴──────────────────┴────────────────────────────────────────────────────────────┘

Screenshot_20230609_113608

@yosifkit
Copy link
Member

yosifkit commented Jun 9, 2023

We strive to publish updated images at least monthly for Debian. We also rebuild earlier if there is a critical security need, e.g. #2171. Many Official Images are maintained by the community or their respective upstream projects, like Ubuntu, Alpine, and Oracle Linux, and are subject to their own maintenance schedule. These refreshed base images also means that any other image in the Official Images program that is FROM them will also be rebuilt (as described in the project README.md file).

- https://github.com/docker-library/faq/tree/da53abbaf0ed592989e5f8b50adcbd062582033d#why-does-my-security-scanner-show-that-an-image-has-cves

As for those particular openssl cves, see debuerreotype/docker-debian-artifacts#195 (comment).

@nemobis
Copy link
Author

nemobis commented Jun 9, 2023 via email

@tianon
Copy link
Member

tianon commented Jun 12, 2023

The downstream rebuild effect when we update is pretty immense, so we try to stick to roughly three weeks barring unusual events like severe CVEs or distro-level releases. There should be an update today (assuming no serious hiccups in the rebuild).

@tianon tianon closed this as completed Jun 12, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants