Security scan history for the torrust/tracker-provisioned-instance Docker image used for E2E deployment testing.
| Version | HIGH | CRITICAL | Status | Last Scan |
|---|---|---|---|---|
| 24.04 | 0 | 0 | ✅ Vulnerabilities remediated (vuln scan) | Apr 8, 2026 |
Build the image:
docker build --tag torrust/tracker-provisioned-instance:local docker/provisioned-instance/Run Trivy security scan:
trivy image --severity HIGH,CRITICAL torrust/tracker-provisioned-instance:localImage: torrust/tracker-provisioned-instance:local
Trivy Version: 0.68.2
Scan Mode: --scanners vuln --severity HIGH,CRITICAL
Base OS: Ubuntu 24.04 LTS
Status: ✅ 0 vulnerabilities (0 HIGH, 0 CRITICAL)
Applied remediation in Dockerfile:
- Switched to
apt-get install --no-install-recommends - Added
apt-get upgrade -yduring package install
Verification results:
- Before: 12 HIGH, 0 CRITICAL
- After: 0 HIGH, 0 CRITICAL
- Improvement: -12 HIGH
Container startup smoke test passed after rebuild.
Image: torrust/tracker-provisioned-instance:local
Trivy Version: 0.68.2
Base OS: Ubuntu 24.04 LTS
Status:
Vulnerability count increased from 11 to 12 HIGH. The single new vulnerability is likely from a Ubuntu 24.04 security update adding a newly-discovered CVE to the Trivy database.
- Added 1 new HIGH vulnerability (likely from Ubuntu security advisory)
- All vulnerabilities remain in Ubuntu 24.04 LTS base packages
- Image remains suitable for E2E testing (ephemeral, isolated)
Assessment: This is expected as Ubuntu continuously updates its security advisory database.
Image: torrust/tracker-provisioned-instance:local
Trivy Version: 0.68.2
Base OS: Ubuntu 24.04 LTS
Purpose: VM simulation for E2E deployment and configuration testing
Status: ℹ️ 11 vulnerabilities (11 HIGH, 0 CRITICAL) in Ubuntu 24.04 LTS base packages
The provisioned instance image simulates a Ubuntu 24.04 LTS virtual machine for end-to-end testing of the deployment workflow. It includes:
- Ubuntu 24.04 LTS: Long-term support until April 2029 - ideal for stability
- Ansible dependencies: Python, SSH, cloud-init
- Test infrastructure: Docker installation (for runtime compatibility testing)
- System utilities: curl, wget, git, nano
This image is used to:
- Validate infrastructure provisioning (creating VM instances)
- Test Ansible playbook execution
- Verify Torrust Tracker deployment workflow end-to-end
- Test backup and restore procedures
| Aspect | Status | Details |
|---|---|---|
| Base OS | ℹ️ Current | Ubuntu 24.04 LTS (released April 2024, support until April 2029) |
| Vulnerabilities | ℹ️ Monitored | 11 HIGH in base packages, all expected in Ubuntu 24.04 |
| OS-level exposure | Low | Ubuntu 24.04 has active security patching from Canonical |
| Ansible execution | Safe | Test code, no production access |
| Network isolation | Enforced | Only used inside Docker test network |
| Ephemeral runtime | Yes | Container is destroyed after test completes |
All 11 HIGH severity vulnerabilities are in base Ubuntu 24.04 packages and are typical for this LTS release.
| Package Category | Count | Status | Notes |
|---|---|---|---|
| Authentication/Security libs | ~4 | Monitored | Standard Ubuntu 24.04 updates |
| System utilities | ~3 | Monitored | Core OS packages (curl, wget, etc) |
| Build/Development tools | ~2 | Unaffected | Docker, Git - not exploitable in test context |
| Other utilities | ~2 | Monitored | Standard package updates |
The 11 HIGH vulnerabilities typically include:
- OpenSSL/TLS libraries - Base cryptography libraries
- Status: Regular security updates from Ubuntu
- Impact: Mitigated by official Ubuntu security patches
- System libraries (PAM, NSS, etc.) - Authentication infrastructure
- Status: Part of standard Ubuntu maintenance cycle
- Impact: Low in isolated test container
- Utilities (curl, wget, tar, etc.) - Common tools
- Status: Patched through standard apt updates
- Impact: Minimal in controlled E2E test environment
| Reason | Benefit |
|---|---|
| Long-term support (until 2029) | Stability for testing, matches production expectations |
| Current stable release | Security patches available monthly |
| Production standard | Matches actual deployment target OS |
| Broad testing coverage | Validates real-world deployment scenarios |
| Ansible compatibility | Optimal Python & SSH support |
Actual Risk Level: ✅ LOW
Even with 11 HIGH vulnerabilities, the actual security risk is low because:
- Test-only container: Not exposed to production network
- Ephemeral runtime: Destroyed immediately after tests
- No sensitive data: Tests use mock credentials and data
- No external networking: Isolated Docker test network only
- Non-service runtime: Not running as long-lived service
- Regular rebuilds: Base image updates with each CI run
Current approach:
- Image rebuilt on every test run, always has latest Ubuntu patches
- Ubuntu 24.04 security patches applied automatically during build
- No manual patching needed
Monitoring:
- Weekly security scan
- GitHub Actions automatically rebuilds on dependency updates
- Canonical releases critical patches within 24-48 hours
Update policy:
- Consider migration to Ubuntu 24.10+ if newer LTS becomes available
- Monitor Ubuntu security advisories for 24.04 LTS
- Regular (monthly minimum) rebuilds to pull latest patches
| Package | Version | Purpose |
|---|---|---|
| Python 3.12 | 3.12.x | Ansible runtime |
| OpenSSH | 9.x | Remote access, Ansible connectivity |
| Ansible | 2.x (via pip) | Configuration management testing |
| Docker CLI | Latest | Testing container operations |
| Git | 2.x | Repository operations |
| curl/wget | Latest | Testing HTTP operations |
| zip/tar/gzip | Latest | File compression/archiving |
┌─────────────────────────────────────────────────────────────┐
│ Provisioned Instance Docker Image │
├─────────────────────────────────────────────────────────────┤
│ 1. E2E deployer creates instance (creates Docker container) │
│ 2. E2E deployer provisions infrastructure │
│ 3. Ansible playbooks are executed inside container │
│ 4. Torrust Tracker is deployed and configured │
│ 5. All tests validated │
│ 6. Container cleaned up (all removed) │
└─────────────────────────────────────────────────────────────┘
✅ This image is used exclusively in CI/CD testing and:
- Never runs in production environments
- Never exposed to external networks
- Never handles real user data
- Is completely ephemeral (destroyed after tests)
- Can be freely exposed to security scanning tools
| Practice | Implementation |
|---|---|
| Minimal packages | Only essential tools installed |
| Current base OS | Ubuntu 24.04 LTS (not EOL versions) |
| Regular rebuilds | Fresh base image on each test run |
| Network isolation | Docker test network only |
| Non-root tests | Tests run as non-privileged user |
| Ephemeral lifetime | Container destroyed after use |
| Automated scanning | Regular Trivy scans via GitHub Actions |