一个漏洞就是一个漏洞,但补丁是一项策略:可启动容器的案例
A bug is a bug, but a patch is a policy: The case for bootable containers

原始链接: https://tuananh.net/2026/02/20/patch-is-policy/

## CVSS评分补丁的终结 传统的基于CVSS评分进行漏洞补丁的企业安全实践正变得过时。Linux内核CNA负责人Greg Kroah-Hartman现在正在为*所有*错误修复发布CVE,而不分配CVSS评分,理由是漏洞影响取决于具体环境。这让组织面临选择:细致的手动分级(缓慢且容易出错)或快速、持续的补丁(“速度”)。 许多人担心“更新疲劳”——频繁的内核更新导致生产系统崩溃。然而,一种新的方法使用**bootc**将整个操作系统视为容器镜像。这使得**原子更新**成为可能:部署新的操作系统版本,如果出现问题会自动回滚,从而消除重启焦虑。 Bootc还促进了**按设计进行的环境分级**:漏洞扫描仅关注您最小操作系统镜像*内部*的组件。最终,这会将安全从争论CVSS评分转变为将补丁作为核心流水线功能进行自动化——将每个错误修复视为相关,并构建弹性以更快地应对潜在漏洞利用。安全变得本地化和策略驱动,不再依赖外部评分系统。

## 可启动容器与内核补丁:摘要 最近的 Hacker News 讨论集中在“可启动容器”——包含内核的容器——以及更广泛的安全漏洞补丁理念上。核心论点建议将*每个*内核漏洞修复都视为相关,并将补丁作为核心系统策略自动化(“补丁即策略”)。 一些评论者争论其可行性。虽然为补丁构建新的操作系统镜像本身并非坏事,但增量更新(如 OSTree)更受欢迎。人们对测试这些完整镜像更新表示担忧,特别是如果未发现问题,可能会导致大范围的启动失败风险。 讨论还涉及 CVSS 评分,安全专业人士批评其具有误导性的“最坏情况”场景和资源消耗。一些人建议使用自动补丁作为替代方案,模仿 Chainguard 等方法。分享了 Fedora Silverblue 等系统的经验,突出了 rpm-ostree 的性能问题。最终,争论围绕着在安全严谨性和运营效率之间取得平衡,以及保持系统更新的最佳方法。
相关文章

原文
Posted on February 20, 2026  •  3 minutes  • 633 words

The old compliance rule no longer works

For years, enterprise security has lived by a simple, if flawed, rule: “Patch anything with a CVSS score above 7.0 within 30 days.” It was a clean metric for auditors and a clear directive for SRE teams.

But in a recent post , Greg Kroah-Hartman, as the head of the Linux Kernel CNA, confirmed a shift that breaks this model. The kernel team is now assigning CVEs to almost every bug fix, thousands of them, but they are refusing to provide a CVSS score.

Greg’s argument is a hard truth: “Usage is different for each user.” He cannot score a vulnerability because he doesn’t know if you’re running a cloud-native microservice or a legacy industrial controller.

You either triage carefully or patch at velocity

Large organizations are now at a crossroads between two radical philosophies. With the kernel CNA no longer providing CVSS scores, you can’t rely on NIST, NVD, or similar bodies to prioritize for you. That crutch is gone.

The triage way (the “precision” tax) This is the traditional approach: manual analysis to see if a “Worst Case Scenario” CVE actually reaches your specific environment. While accurate, it is expensive, slow, and prone to human error. In the face of thousands of unscored kernel CVEs, manual triage is a losing battle.

The Chainguard way (the “velocity” mandate) This philosophy treats triage as a legacy bottleneck. If a patch exists, apply it immediately to reach “Zero-CVE” status. Companies like Chainguard can do this because they bet on a minimal attack surface: small images are easier to test and harder to break. For everyone else, this velocity often leads to Update Fatigue: the very real fear that a frequent kernel update will break production drivers or specialized configurations.

bootc treats the whole OS as a container image

The reason Update Fatigue exists is that we’ve been treating the operating system like a fragile, stateful pet. bootc changes the game by treating the entire OS (kernel, drivers, and user-space) as a standard container image.

By moving to an image-based, bootable container model, we can finally reconcile Greg KH’s “unscored” world with corporate stability:

  • Atomic certainty You don’t “patch” a running server; you push a new version of the OS image. If the new image fails a health check, the system automatically rolls back. This eliminates the primary risk of the “Velocity” approach.

  • Environmental triage by design Greg won’t score the CVE because he doesn’t know your stack, but you do. If your bootc image is minimal (distroless), your vulnerability scanner only flags what is actually inside that image. You aren’t triaging spreadsheets; you are triaging your build file.

  • Solving the human element We solve Update Fatigue by removing “reboot anxiety.” When an OS update is an atomic transaction in a CI/CD pipeline, the “patch” becomes an invisible, automated background task rather than a high-stakes manual event.

For a concrete walkthrough of bootc and getting to a 0-CVE OS on VMs, see my old post achieving a 0-CVE OS for VMs: the end of traditional patching .

Security is local; the patch should be policy

Greg KH isn’t making our lives difficult for fun. He’s highlighting the fact that security is local. The future of corporate security isn’t a team of humans debating CVSS scores.

We must stop litigating which fixes matter and start treating every kernel bug fix as relevant (a bug is a bug). We must stop running patching as a project and bake it into the pipeline so that applying stable fixes is simply what the system does (the patch is the policy). bootc is the engine for that policy: build, test, deploy. We don’t need to know the “score” of a vulnerability if our infrastructure is resilient enough to move faster than the exploit.

联系我们 contact @ memedata.com