Octez-v24.1-1 has been published – critical patch for Docker operators

We have discovered critical vulnerabilities in the Docker images for Octez v24.0 and later versions – other distributions of Octez (sources, binaries, packages, etc.) are safe.

Impact

  • These vulnerabilities (the most relevant being CVE-2025-15467) are not related to the Octez source code itself.
  • They concern only upstream dependencies included in Octez Docker images for Octez v24.0 and later versions.
  • These vulnerabilities may lead to infrastructure crashes and downtime, or to potential remote code execution scenarios.
  • Users relying on other distributions of Octez (binaries, packages, source builds, etc.) are not impacted.

Mitigation

  • These vulnerabilities have been addressed in octez-v24.1-1, a packaging revision for Octez v24.1.
  • This packaging revision only affects deploying Octez Docker images.
  • Users relying on other Octez distribution sources do not need to take any action.

:warning: If you are deploying Octez Docker images, please adopt the octez-v24.1-1 revision as soon as possible. That is, you need to pull and redeploy the newly republished Docker tezos:octez-v24.1 images (or latest).

Packaging Revisions.

This is the first use of our new Octez packaging revision mechanism. It allows us to rebuild and republish specific distribution artifacts - such as Docker images - for an existing Octez release, without changing the Octez version itself.

Packaging revisions follow the format octez-vx.y-n, where n is the build number.

4 Likes