For example, on 12/06/2025, we included an update to containerd in the security patch, but we didn't include that update in the base image until nearly a month later on 01/13/2026.
Ideally there would be some automated tool (as part of CI?) that helped check/prevent releases where something that had already been security-patched was not updated in the next base image.
Alternatively, a tool that checked for known vulnerabilities may accomplish the same thing (since this vuln was known at multiple base-image publish steps)
This ensures:
- Users who aren't using security patch get CVEs fixed.
- Users who are using security patch have secure images from time of boot, rather than time of patch (AFAIK security patch is applied after node launches, right?)
For example, on 12/06/2025, we included an update to containerd in the security patch, but we didn't include that update in the base image until nearly a month later on 01/13/2026.
Ideally there would be some automated tool (as part of CI?) that helped check/prevent releases where something that had already been security-patched was not updated in the next base image.
Alternatively, a tool that checked for known vulnerabilities may accomplish the same thing (since this vuln was known at multiple base-image publish steps)
This ensures: