Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Q: how vulnerabilities are handled in Debian images? #127

Closed
bettio opened this issue Sep 22, 2022 · 1 comment
Closed

Q: how vulnerabilities are handled in Debian images? #127

bettio opened this issue Sep 22, 2022 · 1 comment

Comments

@bettio
Copy link
Contributor

bettio commented Sep 22, 2022

It looks like that OS images are hard coded here: https://github.com/hexpm/bob/blob/main/lib/bob/job/docker_checker.ex#L5 but they are not clearly the latest version:

    "ubuntu" => [
      "jammy-20220428",
      "focal-20211006",
      "bionic-20210930",
      "xenial-20210804",
      "trusty-20191217"
    ],
    "debian" => [
      "bullseye-20220801",
      "buster-20220801",
      "bullseye-20220801-slim",
      "buster-20220801-slim"
    ]

e.g. at the moment buster-20220912-slim is available.

What happens if any vulnerability in any library, (e.g. libssl, libc or whatever) is discovered? Are you constantly monitoring for relevant security issues (e.g. scanning images), and rebuilding them using new versions in that case?

Otherwise do you suggest having builder-image-version != runner-image-version (the latest)?
e.g.:
ARG BUILDER_IMAGE="hexpm/elixir:1.14.0-erlang-25.1-debian-buster-20220801-slim"
ARG RUNNER_IMAGE="debian:buster-20220912-slim"

So I would love to hear any comment about security policy for docker images if they can be safely used in production.

@ericmj
Copy link
Member

ericmj commented Sep 23, 2022

Yes, you should definitely use different builder and runner images, if nothing else to keep the runner image small.

We don't have any automatic monitoring for security issues. We rely on the community to help us keep the images up to date. You can also add RUN apt update && apt upgrade to your dockerfile to update to the latest package versions.

@ericmj ericmj closed this as completed Sep 25, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants