On https://meltdownattack.com/ it is suggested that (in some cases?) scenarios with Docker containers are also vulnerable.
I'm a developer using Docker for two different purposes:
- Images used for running build steps in GitLab CI/CD
- A few images running in production in a cloud (Azure and AWS)
These images are a mix of things, ultimately based on either Alpine, Debian, or Ubuntu. Often my Dockerfile is based off some intermediate image, like one with Nodejs/NPM for a front-end build for example.
Assuming the base OS (e.g. Debian) has patched things in their latest update, what is the recommended way to get my own images up to date? For example if I'm using node:8.9.4
currently, do I have to monitor and wait for a newer tag that fixes the problem?