-
Notifications
You must be signed in to change notification settings - Fork 268
Vendors to deal with vulnerabilties on Docker Hub #750
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
TLDRThis summarizes the problem I have as a user of container images very well. I'm unable to tell, which of the vulnerabilities are to be takes serious, especially if there are many of those in an image (especially found for containers for databases like MySQL, MariaDB, PostgreSQL) and there are no real alternatives. I definitively want some kind of VEX for Docker Scout! THIS would reduce lot's of wasted time for users (needing to check security before using them), maintainers (needing to repeatedly answer those questions). And it would prevent people from being too scared to use a software at all. Especially now that in Europe we have the Cyber-Resilience-Act, NIS-2 and the Product Liability Directive, this gets more and more important to become something that is handled time and money efficient! Long versionA less informed user might ask: Why not just use libraries and version that does not contain known vulnerabilities? But, having worked on multiple complex and older projects, I know that you cannot just upgrade to the newest version of a library in many cases, without having to rework a major part of your software. And as @grooverdan already said, many vulnerabilities might not be relevant, if the container/software uses the vulnerable libraries/software in a way that mitigates the attach vector (e.g. by (a) never using the vulnerable routines, (b) filtering input data, (c) special configuration that disables vulnerable features, ...). These are totally valid ways to cope with these issues. As the user of the container, I'm responsible for the service to keep user / company data secure and safe. And in any case of a security breach, I might be asked: Well, why have you used a container with vulnerabilities after all? When just looking at the numbers of two containers for the same software... for example: I should probably decide for (b) --- But, this might be the wrong decision, if in version (a) the maintainer has taken care of any such vulnerabilities to be effectively mitigated.... and in (b) the maintainer just tried to use software with less vulnerabilities, without taking care about which of them are exploitable. Without additional information I'm lost. Having a officially documented statement from the maintainer:
would allow for:
I need this information from the maintainer, closely linked to the CVEs at the same place where they are displayed. My question is: PS: This is nothing to be found in the container description, as it's always related to a certain Tag / Image. |
Tell us about your request
Software Vendors need a way to acknowledge/negative acknowledge vulnerabilities in containers. The existence of a vulnerable software component in a container does not make it exploitable in every container it exists in. Many vulnerabilities require a specific code path or configuration to be exploitable. Its a tough question to answer without deep knowledge about the container and application to determine if a vulnerability is exploitable.
A end user getting a vulnerability notice from Docker Scout or Docker Hub isn't in a position to comprehend the impacts. The software vendor isn't in a position to answer the same question repetitively (if they are asked). The software vendor writing a security information page isn't strongly linked to the red to orange glowing security notices that exist there.
A VEX exchange or similar standard where software vendors can provide a meaningful analysed assessment of specific CVEs as it pertains to their product in a machine readable format such that users can get the right information rather than a generic there is this vulnerable software package in your container.
The data the vendor can offer is:
Layered containers can use and override security advice from vendors base image.
ref: docker-library/official-images#14889
Which service(s) is this request for?
Docker Scout, Docker Hub.
Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard?
As a software vendor, many vulnerabilities of components of a container (packages and other SBOM sources) have no exploit-ability in a container. Users are too scared of the look of security notices to even examine the impacts. A user reading the CVE will infrequently be able to tell how that applies to a container they are using.
Are you currently working around the issue?
Security page - https://github.com/MariaDB/mariadb-docker/blob/master/SECURITY.md, but its so far away technically from where security information is displayed without any hard linkages.
Additional context
ref: docker-library/official-images#14889
The text was updated successfully, but these errors were encountered: