aptible rebuild
to rebuild and deploy the new image:
FROM debian:8.11
to get the latest version of this image, which may have upgraded packages in it, but by the time you read this FAQ there will be a newer still version available. So, you should prefer to use FROM debian:8
, which is maintained to always be the latest Debian 8 image, as documented on the Docker Hub. This version tagging pattern is common on many images, so check the documentation of your parent image in order to choose the appropriate tag.
Finally, the vulnerability details might indicate a newer OS, eg Debian 10, includes a version with the vulnerability remediated. This change may be more impactful than those suggested above, given the types of changes that may occur between major versions of an operating system.
4.84.2-2+deb8u7
release of exim4
. So, you would either want to test the newer version and specify it explicitly in your Dockerfile, or simply remove the explicit request for a particular version to be sure that exim4 is always kept up to date.
apt-cache rdepends --installed $PACKAGE
.
libmpc3
, which you only need as a dependency of build-essential
. You would still need to determine if the vulnerability discovered affected your app through the use of libmpc3
, even if you have later uninstalled it.
Finally, many parent images will include many unnecessary packages by default. Try the -slim
tag to get an image with less software installed by default, for example, python:3
contains a large number of packages that python:3-slim
does not. Not all images have this option, and you will likely have to add specific dependencies back in your Dockerfile to keep your App working, but this can greatly reduce the surface area for vulnerability by reducing the number of installed packages.
1.0.2g-1ubuntu4.6
version you likely have installed is actually vulnerable.
Does the vulnerability actually impact your use of the package? The vulnerability may be present in a function you do not use or in a service, your image is not actually running.
Is the vulnerability otherwise mitigated by your security posture? Many vulnerabilities can be remediated with simple steps like sanitizing input to your application or by not running or exposing unnecessary services.
If you’ve reached this point and the scanner has helped you identify a real vulnerability in your application, it’s time to decide on another mitigation strategy!