-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Apache 2.4.61 security release #1529
Comments
Also listening in as I use this image a lot and the old Apache release has a critical vulnerability that I'd like to be rid of. |
The Apache httpd that we use comes from Debian's packages, so they would have to incorporate/backport patches to address these vulnerabilities. As it turns out, there is an update available, so it will get installed next time the image is rebuilt.
Background:
Official Images FAQ:
To ensure that we don't push contentless image changes, we rely on periodic base image updates.
So, given that the last Debian rebuild was 2 weeks ago (docker-library/official-images#17091), the next rebuild would likely be next week or the week after at the latest (earlier is more likely). If you need package updates earlier, then temporarily installing them in your own image is the workaround until an updated image is available. |
@yosifkit thanks for explaining the process. |
I can see that new images have just been built however they appear to still include Apache 2.4.59 which has the critical security vulnerability. For example |
The latest one is fixed. the link you provided is an outdated one https://hub.docker.com/layers/library/php/8-apache/images/sha256-5d592ca8c06afa668141b40c08e72839d4e85a9b055872fd8331e5a9479199a6?context=explore |
@LaurentGoderre Thanks! That was the latest image when I checked but it looks like a more recent one has been pushed since then. |
Thanks for the update, got mine updated :) |
There have been two recent security releases for Apache:
However the latest images appear to be running Apache 2.4.59 which is shown as having a critical security vulnerability.
Is it possible to build new images that include the latest version of Apache and patch this security vulnerability?
The text was updated successfully, but these errors were encountered: