|
| 1 | +# Address Docker Image Vulnerabilities - April 8, 2026 Scan |
| 2 | + |
| 3 | +**Issue**: #428 |
| 4 | +**Parent Epic**: #250 - Implement Automated Docker Image Vulnerability Scanning |
| 5 | +**Related**: |
| 6 | + |
| 7 | +- [Docker Security Scanning Guide](../security/docker/README.md) |
| 8 | +- [Vulnerability Scan Results](../security/docker/scans/README.md) |
| 9 | + |
| 10 | +## Overview |
| 11 | + |
| 12 | +The April 8, 2026 security scan revealed increased vulnerabilities across all Docker images. While primarily caused by Trivy database updates, several real issues require investigation and remediation. |
| 13 | + |
| 14 | +**Current Status by Image**: |
| 15 | + |
| 16 | +1. Deployer: 49 HIGH (regression from 1) |
| 17 | +2. Backup: 6 HIGH (improvement from 7) |
| 18 | +3. SSH Server: 1 HIGH (stable, test artifact) |
| 19 | +4. Provisioned Instance: 12 HIGH (minor increase) |
| 20 | +5. Caddy: 24 HIGH (Go dependency updates) |
| 21 | +6. Prometheus: 20 HIGH (Go binary updates) |
| 22 | +7. Grafana: 24 HIGH (mixed base + Go issues) |
| 23 | +8. MySQL: 8 HIGH (gosu binary, Python) |
| 24 | + |
| 25 | +## Goals |
| 26 | + |
| 27 | +- [ ] Investigate Trivy database update impact |
| 28 | +- [ ] Filter false positives from real vulnerabilities |
| 29 | +- [ ] Prioritize remediations by deployability impact |
| 30 | +- [ ] Complete high-impact fixes |
| 31 | +- [ ] Document findings and next steps |
| 32 | + |
| 33 | +## Implementation Plan |
| 34 | + |
| 35 | +### Working Rule |
| 36 | + |
| 37 | +- [ ] Process exactly one image at a time |
| 38 | +- [ ] Do not start the next image until the current image checklist is complete |
| 39 | +- [ ] Update this file after each image step to keep progress visible |
| 40 | + |
| 41 | +### Standard Steps (Repeat Per Image) |
| 42 | + |
| 43 | +For each image, execute these steps in order: |
| 44 | + |
| 45 | +1. Analysis and triage |
| 46 | +2. Remediation attempt |
| 47 | +3. Verification (rebuild + re-scan + smoke test) |
| 48 | +4. Documentation update |
| 49 | +5. Follow-up issue (only if unresolved) |
| 50 | + |
| 51 | +### Per-Image Progress Tracking |
| 52 | + |
| 53 | +#### 1. Deployer (`torrust/tracker-deployer`) |
| 54 | + |
| 55 | +- [x] Analysis and triage completed |
| 56 | +- [x] Easy remediation implemented (if available) |
| 57 | +- [x] Image rebuilt and validated |
| 58 | +- [x] Trivy re-scan completed and compared |
| 59 | +- [x] Scan docs updated |
| 60 | +- [x] Follow-up issue created (only if unresolved; N/A - resolved) |
| 61 | +- [x] Image marked done |
| 62 | + |
| 63 | +#### 2. Backup (`torrust/tracker-backup`) |
| 64 | + |
| 65 | +- [x] Analysis and triage completed |
| 66 | +- [x] Easy remediation implemented (if available) |
| 67 | +- [x] Image rebuilt and validated |
| 68 | +- [x] Trivy re-scan completed and compared |
| 69 | +- [x] Scan docs updated |
| 70 | +- [x] Follow-up issue created (only if unresolved) |
| 71 | +- [x] Image marked done |
| 72 | + |
| 73 | +#### 3. SSH Server (`torrust/tracker-ssh-server`) |
| 74 | + |
| 75 | +- [x] Analysis and triage completed |
| 76 | +- [x] Easy remediation implemented (if available) |
| 77 | +- [x] Image rebuilt and validated |
| 78 | +- [x] Trivy re-scan completed and compared |
| 79 | +- [x] Scan docs updated |
| 80 | +- [x] Follow-up issue created (only if unresolved) |
| 81 | +- [x] Image marked done |
| 82 | + |
| 83 | +#### 4. Provisioned Instance (`torrust/tracker-provisioned-instance`) |
| 84 | + |
| 85 | +- [x] Analysis and triage completed |
| 86 | +- [x] Easy remediation implemented (if available) |
| 87 | +- [x] Image rebuilt and validated |
| 88 | +- [x] Trivy re-scan completed and compared |
| 89 | +- [x] Scan docs updated |
| 90 | +- [x] Follow-up issue created (only if unresolved; N/A - resolved) |
| 91 | +- [x] Image marked done |
| 92 | + |
| 93 | +#### 5. Caddy (`caddy:2.10`) |
| 94 | + |
| 95 | +- [x] Analysis and triage completed |
| 96 | +- [x] Easy remediation implemented (if available) |
| 97 | +- [x] Image rebuilt and validated |
| 98 | +- [x] Trivy re-scan completed and compared |
| 99 | +- [x] Scan docs updated |
| 100 | +- [x] Follow-up issue created (only if unresolved) |
| 101 | +- [x] Image marked done |
| 102 | + |
| 103 | +#### 6. Prometheus (`prom/prometheus:v3.5.0`) |
| 104 | + |
| 105 | +- [x] Analysis and triage completed |
| 106 | +- [x] Easy remediation implemented (if available) |
| 107 | +- [x] Image rebuilt and validated |
| 108 | +- [x] Trivy re-scan completed and compared |
| 109 | +- [x] Scan docs updated |
| 110 | +- [x] Follow-up issue created (only if unresolved) |
| 111 | +- [x] Image marked done |
| 112 | + |
| 113 | +#### 7. Grafana (`grafana/grafana:12.3.1`) |
| 114 | + |
| 115 | +- [x] Analysis and triage completed |
| 116 | +- [x] Easy remediation implemented (if available) |
| 117 | +- [x] Image rebuilt and validated |
| 118 | +- [x] Trivy re-scan completed and compared |
| 119 | +- [x] Scan docs updated |
| 120 | +- [x] Follow-up issue created (only if unresolved) |
| 121 | +- [x] Image marked done |
| 122 | + |
| 123 | +#### 8. MySQL (`mysql:8.4`) |
| 124 | + |
| 125 | +- [x] Analysis and triage completed |
| 126 | +- [x] Easy remediation implemented (if available; no safe tag improvement found) |
| 127 | +- [x] Image rebuilt and validated |
| 128 | +- [x] Trivy re-scan completed and compared |
| 129 | +- [x] Scan docs updated |
| 130 | +- [x] Follow-up issue created (only if unresolved) |
| 131 | +- [x] Image marked done |
| 132 | + |
| 133 | +## Acceptance Criteria |
| 134 | + |
| 135 | +- [x] All 8 image checklists above are complete |
| 136 | +- [x] Each image was processed sequentially (one-at-a-time) |
| 137 | +- [x] Easy fixes were applied where possible and verified |
| 138 | +- [x] Scan documentation reflects post-remediation results |
| 139 | +- [x] Remaining unresolved cases have dedicated follow-up issues |
| 140 | +- [x] Pre-commit checks pass |
| 141 | +- [x] Changes reviewed |
| 142 | + |
| 143 | +## References |
| 144 | + |
| 145 | +- [Docker Security Scans](../security/docker/scans/README.md) |
| 146 | +- [Trivy Documentation](https://aquasecurity.github.io/trivy/) |
| 147 | +- [Debian Security Tracker](https://security-tracker.debian.org/) |
0 commit comments