-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Include Ubuntu as a variant for faster patch releases #708
Comments
My stance remains unchanged: #61 (comment). |
I think the "underlying distribution is irrelevant" doesn't always hold. Frequently, in order to build packages that don't ship You also can't be agnostic when dealing with security issues. Unless your application is pretty narrow, it's going to be calling out to many other libraries to access a database, format an image, compress a file, send some network traffic... Because these CVEs come and get squashed, it's hard to "replicate" this issue, but for some example as of now, here's Apache, which has a known vuln in Debian Bullseye, but it's patched in Ubuntu 20.04 Focal. I don't use Apache as much as nginx, but I've had vulnerable libpng's and such show up. In general the trend seems to be that Ubuntu security fixes can roll out faster.
Some commands to check package versions and their output...
|
Sure, in a perfect world we'd support every combination of every popular distribution across every actively supported/maintained version of both Python and the distributions, but both from a support/maintenance perspective and a build time/complexity perspective, that just isn't reasonable. For example, each version of just Python 3.11 on each version of Alpine we support takes upwards of 30 minutes to build (so that's a full hour of straight compilation just for two versions of Alpine on one single version of Python). 😬 🙈 I imagine our |
Can confirm, replacing We were unable to use Debian for our base images due to missing library versions for what we are attempting to install, but Ubuntu works for our purposes. |
Closing, as this is unfortunately not something we plan to support. Sorry! ❤️ (see #708 (comment)) |
I understand the decision to not take on additional complexity by providing support for I distribute Docker images where we didn't mind either debian or ubuntu, so we switched to using the I tracked it down to
In practice I don't know if this is a security problem, but the noise of reported known vulnerabilities is a problem. For example, one of the critical vulnerabilities as reported by Due to this, the open source project I'm working in is moving back towards Thank you for your work in this project, the |
Thank you for your kind words ❤️ For some added insight, the primary reason I've found over the years that CVE scanners are less kind to Debian than they are to Ubuntu is that Ubuntu clearly marks CVEs as "WONTFIX" (which the scanners than interpret as "hide this CVE"), where the Debian Security Team never says outright that something will not be fixed because any Debian Developer / member of the project (or someone with enough time to do the work and find a sponsor for it) can fix any issue they like. For example, the maintainer of a given package could choose to fix every CVE filed against their packages in stable, if they so chose, even if the Security Team at large has decided that most of them aren't worth fixing in stable. The way the Security Team normally telegraphs their evaluation of the CVE's severity within the context of the Debian package and how it is used is with a "no-dsa" tag in the notes, which IMO all the scanning vendors should pick up and interpret the same as they do "WONTFIX" in Ubuntu (because it really is the exact same meaning), but I have not seen any of them doing so, even in spite of the many long meetings I've had with several of them describing this. 😞 See docker-library/mysql#188 (comment) for an example where I went through a very long list of CVEs on the |
@tianon wow amazing work in detailing this situation!!! I pinged you in jupyterhub/zero-to-jupyterhub-k8s#2918 (comment), asking if you know a place where this is being tracked by trivy (or debian). |
When using security scanners, there are often complaints about unfixed CVEs in the Debian image. Debian, for better or worse, seems to value increased stability, leading to more, older (found) bugs vs. Ubuntu's quicker releases which probably cause more new bugs. Which is better? ¿Porque no los dos?
Adding
focal
to the list of variants alongsidebuster
andbullseye
would seem to add Ubuntu to the list of Python images without much trouble. Bothfocal
(20.04) andjammy
(22.04, prerelease until ~Apr 21) tags are available as buildpack-deps tags (https://hub.docker.com/_/buildpack-deps).I can get a PR together if the maintainers are amenable to the idea.
The text was updated successfully, but these errors were encountered: