You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A CVE doesn't imply having an actual vulnerability, and often is even a false positive (given how most distributions handle versioning/security updates in stable releases). If there are actionable items we can resolve, we're happy to do so (and do so actively). We update all Debian based images to include any updates in apt packages at least monthly (we regenerate the base images and then rebuild all dependent images).
Additionally we're not comfortable supporting an image based on unstable or testing #364
Currently bullseye and testing are equivalent (until bullseye becomes stable later this year). sid and unstable are always equivalent.
Unfortunately CVE's that are deemed minor by the Debian Security Team (https://www.debian.org/security/) and thus not fixed in stable (aka buster and 10) are not reason enough to create images based on testing or unstable since they are not security-supported. See also docker-library/golang#316 (comment).
Hi,
The debian based docker images contains a lot of vulnerabilities
https://security-tracker.debian.org/tracker/CVE-2019-9169
https://security-tracker.debian.org/tracker/CVE-2019-18224
https://security-tracker.debian.org/tracker/CVE-2019-12900
https://security-tracker.debian.org/tracker/CVE-2016-2779
...
Including the current stable, buster
https://security-tracker.debian.org/tracker/CVE-2019-16168
https://security-tracker.debian.org/tracker/CVE-2019-19603
https://security-tracker.debian.org/tracker/CVE-2019-20218
...
Could you add the debian-bulleyes and debian-sid and adds debian-stable, debian-testing and debian-unstable tags ?
Best regards.
The text was updated successfully, but these errors were encountered: