Skip to main content

Daily security updates

For every image line, the most recent version is actively maintained by Minimus. This means Minimus builds the most recent image version within every image line every time there is an update in any of the internal packages or their dependencies. See architecture Once a new version is published in an image line, active maintenance is transferred to the new version. For example, nginx is typically released every 2 months (ref). Between these version releases, vulnerabilities are discovered and fixed in different packages that make up the image. Minimus builds all packages from source daily and then rebuilds the images from the most recent packages every day. This process ensures that Minimus delivers the most secure images available to its users as soon as possible.

Package release cycle

Minimus builds packages on a rolling basis, as soon as an update is available upstream. If a new package version fixes a vulnerability, the advisory status will be changed to fixed as soon as the package is fixed. Affected images will show as pending image build until the daily image build cycle completes and the new fixed version is released by Minimus. Learn more

Image release cycle

Minimus builds fresh images once a day from the latest packages. The images that Minimus actively maintains are always the last version in every image line. Older versions in every image line will begin to accrue vulnerabilities once they are no longer actively maintained. This will become clear from the vulnerability count and severity distribution. This is a good indication that you should upgrade to a newer version as soon as possible.
Old Versions Accrue Vulnerabilities
In the above example, Python version 3.14.3, the latest version in the image line, is actively maintained with new daily builds and package updates. Previous versions are not being rebuilt and will quickly accrue vulnerabilities.

Internal package updates

Minimus maintains the most recent version in each image line on a daily basis. Image versions that are actively receiving updates will be rebuilt whenever there are packages to update. These internal updates will not affect the image version, but will be recorded in the image Changelog and the Digest History.

Same image version tag, different SBOM

The image version can be rebuilt without a change in the image version tag. The image version tag will stay the same, but the image will have a different SBOM, digest, and timestamp tag. The vulnerability status may be different too. The image is functionally the same, but packages under the hood have changed. The image version tag is determined by the version of the primary package (e.g. package nginx in the nginx image, package python-x.xx in the Python image, and so forth). Other packages in the image are updated by Minimus on a daily basis, in keeping with the package and image release cycle.

Unique timestamp tag

Minimus uses a unique timestamp tag to identify its images in addition to the digest. The timestamp tag is a human-readable alternative to the image digest developed by Minimus. The unique timestamp tag can help you easily tell apart different builds for the same image version and reliably pull the most recent build for a specific version. Timestamp Tag The timestamp tag indicates when the build was published, for example:
  • elasticsearch:8.17.2-dev-202503040032 is the tag for the Elasticsearch image version 8.17.2 built on March 4, 2025 at 00:32 UTC.
  • nginx:1.27.4-202503070038 is the tag for the NGINX image version 1.27.4 built on March 7, 2025 at 00:38 UTC.

Example

Let’s look at an example to see how the image build cycle is reflected in the Minimus console. Consider Zookeeper’s latest image. On March 11, 2026, it was version 3.9.4. When this screenshot was taken, the version had been out for over 8 months.
Zookeeper Latest Build
Upon closer inspection, you will notice the Minimus image was built the same day. This follows the Minimus image release cycle: the most recent version in every image line is continuously being rebuilt with the latest packages whenever there are updates to deliver. Next, we will visit the image Changelog to view all of the times that Zookeeper’s image version 3.9.4 was updated by Minimus. The changelog shows there are 38 different digests for the same image version. This means that Minimus published the Zookeeper image version 3.9.4 38 times, so as to update many packages and fix CVEs numerous times since the image version was first released.
Zookeeper Changelog
In the changelog, click compare digests to view the Digest History, a condensed list of all of the builds for the selected image version. The Digest History view focuses on the current vulnerability count and severity for each of the image builds, along with their digest ID and unique timestamp tag.
Zookeeper Digests

Pull specific build by digest or unique timestamp tag

You can use the respective copy buttons in the Minimus Digest History tab to pull the specific build of an image version by either the digest or unique timestamp tag.
docker pull reg.mini.dev/zookeeper@sha256:2a6f56d49d1e8300...

Avoiding cached images

To get the most secure image, it’s important to pull a fresh Minimus image every time. Docker, Kubernetes, and Helm will often default to using a cached image unless explicitly directed to pull a fresh image. Learn how to force a fresh image pull
Last modified on April 13, 2026