Master repository where Dockerfiles for Amazon Corretto are hosted. These docker files are used to build images for Amazon Corretto Offical Images and ECR images.
The docker images are available on Amazon Corretto Official Images
To use Amazon Corretto Official Images from Docker hub run
docker pull amazoncorretto:17
The docker images are also available on Amazon ECR.
To get Corretto docker images from Amazon ECR please see Amazon Corretto's ECR Public Gallery as well as the Docker Official Images ECR Public Gallery
To use docker images from Corretto ECR Public Gallery run the following commands:
docker pull public.ecr.aws/amazoncorretto/amazoncorretto:17
docker run -it public.ecr.aws/amazoncorretto/amazoncorretto:17 /bin/bash
You can see the list of available images by going to: https://gallery.ecr.aws/amazoncorretto/amazoncorretto
See https://hub.docker.com/_/amazoncorretto
To build the docker images, you can use the following command.
docker build -t amazon-corretto-{major_version} -f ./{major_version}/{jdk|jre|slim}/{al2|alpine|debian}/Dockerfile .
If you would like to report a potential security issue in this project, please do not create a GitHub issue. Instead, please follow the instructions here or email AWS security directly.
If a security scanner reports that an amazoncorretto image includes a CVE, the first recommended action is to pull an updated version of this image with docker pull amazoncorretto:<tag>
.
If no updated image is available, run the appropriate command to update packages for the platform, ie. run "apk -U upgrade" for Alpine or "yum update -y --security" for AmazonLinux in your Dockerfiles or systems to resolve the issue immediately.
If no updated package is available, please treat this as a potential security issue and follow these instructions or email AWS security directly at aws-security@amazon.com.
It is the responsibility of the base docker image supplier to provide timely security updates to images and packages. The amazoncorretto images are automatically rebuilt when a new base image is made available, but we do not make changes to our Dockerfiles to pull in one-off package updates. If a new base image has not yet been made generally available by a base docker image maintainer, please contact that maintainer to request that the issue be addressed.
Note that there are multiple reasons why a CVE may appear to be present in a docker image, as explained in the docker library FAQs.
Security scanners may use heuristics or version checks of packages compared to a security advisory to determine if an image is potentially vulnerable. The generic Linux Corretto RPMs use a slightly different version than packages built specifically for Amazon Linux, images are available for both package types. When an Amazon Linux Security Advisory (ALAS) bulliten is published it will include the Corretto package name and version that contains the fix and that version will not correctly match the generic Linux package.
amazoncorretto:
amazoncorretto:
amazoncorretto:
amazoncorretto:
amazoncorretto:apt
/deb
based distributions, but does not provide pre-built images.
jre - Contains only the runtime components and not the compiler. Suitable for most services.
jdk - Full development environment with compiler and tools.
headless - Contains runtime components without GUI libraries and dependencies. This will be the smallest image and is suitable for most services.
headful - Runtime components with GUI libraries and dependencies.
jdk - Full development environment with compiler and tools.
Image tags contain either just the major version or a specific security update version. Corretto 8 version tags have a format of 8u<security_update_version>
, for example 8u402
. Corretto 11 and later use <major_version>.0.<security_update_version>
, for example 11.0.22
. Images for a major version always point to the latest security update. Once a new security update version is released, the old tag no longer gets base image updates but remains available.