-
Notifications
You must be signed in to change notification settings - Fork 512
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add debian:bookworm distro for 1.20 and 1.19 #456
Conversation
Do you have some examples? I built this locally so I could compare, and I'm coming up with a different result: $ docker scout compare golang:bookworm --to golang:bullseye
WARN 'docker scout compare' is in early preview and its behaviour might change in the future
v SBOM of image already cached, 300 packages indexed
v SBOM of image already cached, 300 packages indexed
## Overview
│ Analyzed Image │ Comparison Image
────────────────────┼────────────────────────────────────┼─────────────────────────────────────
Image reference │ golang:bookworm │ golang:bullseye
vulnerabilities │ 0C 1H 3M 35L 5? │ 0C 0H 0M 60L 1?
│ +1 +3 -25 +4 │
│ │
Base image │ buildpack-deps:bookworm-scm │ buildpack-deps:bullseye-scm
tags │ also known as │ also known as
│ • testing-scm │ • scm
│ │ • stable-scm
vulnerabilities │ 0C 0H 1M 28L 8? │ 0C 0H 0M 41L 1?
... There is some additional context in https://github.com/docker-library/faq#why-does-my-security-scanner-show-that-an-image-has-cves specifically about CVEs. The Debian Security Team is extremely proactive about important security fixes, especially in the active (The single "high" that comes up for me on Bookworm is https://dso.docker.com/cve/CVE-2023-0464, which from https://security-tracker.debian.org/tracker/CVE-2023-0464 you can see is marked as essentially "wontfix" by the Debian Security Team because it's a "minor issue": Once Bookworm is officially released, we will definitely update this repository to support it, but until then we plan to continue to wait (especially as Debian Bookworm is not actively supported by the Debian Security Team until it is officially released). |
@tianon the primary image for me was ruby. putting everything into bookworm I had to build golang programs under it as well. I use
Please, see the attachments for full report. Maybe those critical and high CVEs are not important but I needed to have my Harbor scans clean. Moving to bookworm was the simplest option. I know for example that at least 1 critical CVE there is not that important For some of those issues debian devs reported that it will be too complicated to either migrated or mitigate affected versions. It's hard to manually ensure hundreds of those are actually safe... |
0d32b8f
to
660f8ec
Compare
Rebased on master. Added Edit: dropped backports for |
Signed-off-by: Ivan Prisyazhnyy <john.koepi@gmail.com>
660f8ec
to
cd60713
Compare
Changes: - docker-library/golang@db757a0: Merge pull request docker-library/golang#456 from sitano/ivan_golang_bookworm - docker-library/golang@cd60713: Add debian:bookworm distro for 1.20 and 1.19, drop buster
There are many CVEs not-fixed in bullseye that we need a newer version that is better with critical and high issues.