security-vulnerabilities: add more info about base images (#11236)

This commit is contained in:
John Howard 2022-04-28 13:00:33 -07:00 committed by GitHub
parent 6237737685
commit 2d02dea8b2
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 16 additions and 0 deletions

View File

@ -42,6 +42,7 @@ Don't send a vulnerability report if:
- You need help tuning Istio components for security.
- You need help applying security related updates.
- Your issue is not security related.
- Your issue is related to base image dependencies (see [Base Images](#base-images))
## Evaluation
@ -87,3 +88,18 @@ branches.
As much as possible this announcement will be actionable, and include any mitigating steps customers can take prior to
upgrading to a fixed version. The recommended target time for these announcements is 16:00 UTC from Monday to Thursday.
This means the announcement will be seen morning Pacific, early evening Europe, and late evening Asia.
## Base Images
Istio offers two sets of docker images, based on `ubuntu` (default) and based on `distroless` (see [Harden Docker Container Images](/docs/ops/configuration/security/harden-docker-images/)).
These base images occasionally have CVEs.
The Istio security team has automated scanning to ensure base images are kept free of CVEs.
When CVEs are detected in our images, new images are automatically built and used for all future builds.
Additionally, the security team analyzes the vulnerabilities to see if they are exploitable in Istio directly.
In most cases, these vulnerabilities may be present in packages within the base image, but are not exploitable in the way Istio uses them.
For these cases, new releases will not typically be released just to resolve these CVEs, and the fixes will be included in the next regularly scheduled release.
As a result, base image CVEs should not be [reported](#reporting-a-vulnerability) unless there is evidence it may be exploitable within Istio.
The [`distroless`](/docs/ops/configuration/security/harden-docker-images/) base images are strongly encouraged if reducing base image CVEs is important to you.