Skip to content

feat: release new debian-base image #3766

Open
@awatterson22

Description

@awatterson22

What would you like to be added:

A new release for registry.k8s.io/build-image/debian-base

Why is this needed:

The current version: registry.k8s.io/build-image/debian-base:bookworm-v1.0.4, has a package: libexpat1 that contains a CRITICAL security vulnerability. I am trying to use this image registry.k8s.io/sig-storage/smbplugin:v1.15.0 and this image uses the above image as a base. They can't upgrade to the new remediated version of libexpat1 which is 2.6.3-1, so we need the base image to be updated.

           _            _ _
 __      _(_)____   ___| (_)
 \ \ /\ / / |_  /  / __| | |
  \ V  V /| |/ /  | (__| | |
   \_/\_/ |_/___|  \___|_|_|
 SUCCESS  Ready to scan Docker image registry.k8s.io/sig-storage/smbplugin:v1.15.0                                                                                                                       
 SUCCESS  Scanned Docker image                                                                                                                                                                                            
 SUCCESS  Docker image scan analysis ready                                                                                                                                                                                
OS Package vulnerabilities:
.
.
.
    Name: libexpat1, Version: 2.5.0-1
        CVE-2024-45490, Severity: CRITICAL, Source: https://security-tracker.debian.org/tracker/CVE-2024-45490
        CVE-2024-45491, Severity: HIGH, Source: https://security-tracker.debian.org/tracker/CVE-2024-45491
        CVE-2024-45492, Severity: HIGH, Source: https://security-tracker.debian.org/tracker/CVE-2024-45492
        CVE-2023-52425, Severity: LOW, Source: https://security-tracker.debian.org/tracker/CVE-2023-52425
            CVSS score: 7.5, CVSS exploitability score: 3.9
            💥 Has public exploit
        CVE-2023-52426, Severity: LOW, Source: https://security-tracker.debian.org/tracker/CVE-2023-52426
            CVSS score: 5.5, CVSS exploitability score: 1.8
        CVE-2024-28757, Severity: LOW, Source: https://security-tracker.debian.org/tracker/CVE-2024-28757
.
.
.

Metadata

Metadata

Assignees

No one assigned

    Labels

    area/release-engIssues or PRs related to the Release Engineering subprojectkind/featureCategorizes issue or PR as related to a new feature.needs-prioritysig/releaseCategorizes an issue or PR as relevant to SIG Release.

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions