首页> 外文会议>IEEE International Conference on Software Analysis, Evolution, and Reengineering >On the Relation between Outdated Docker Containers, Severity Vulnerabilities, and Bugs
【24h】

On the Relation between Outdated Docker Containers, Severity Vulnerabilities, and Bugs

机译:关于过时的Docker容器,严重性漏洞和错误之间的关系

获取原文

摘要

Packaging software into containers is becoming a common practice when deploying services in cloud and other environments. Docker images are one of the most popular container technologies for building and deploying containers. A container image usually includes a collection of software packages, that can have bugs and security vulnerabilities that affect the container health. Our goal is to support container deployers by analysing the relation between outdated containers and vulnerable and buggy packages installed in them. We use the concept of technical lag of a container as the difference between a given container and the most up-to-date container that is possible with the most recent releases of the same collection of packages. For 7,380 official and community Docker images that are based on the Debian Linux distribution, we identify which software packages are installed in them and measure their technical lag in terms of version updates, security vulnerabilities and bugs. We have found, among others, that no release is devoid of vulnerabilities, so deployers cannot avoid vulnerabilities even if they deploy the most recent packages. We offer some lessons learned for container developers in regard to the strategies they can follow to minimize the number of vulnerabilities. We argue that Docker container scan and security management tools should improve their platforms by adding data about other kinds of bugs and include the measurement of technical lag to offer deployers information of when to update.
机译:包装软件进入容器正在在云和其他环境中部署服务时成为常见的做法。 Docker图像是建造和部署容器最受欢迎的容器技术之一。容器图像通常包括一组软件包,可以具有影响容器运行状况的错误和安全漏洞。我们的目标是通过分析安装在其中的过时的容器和易受攻击和丢包包之间的关系来支持容器部署。我们使用容器的技术滞后概念作为给定容器和最新的容器之间的差异,这是最近的相同包装收集的最新版本。对于基于Debian Linux发行版的7,380个官方和社区Docker图像,我们确定了哪些软件包,并根据版本更新,安全漏洞和错误来衡量其技术延迟。除此之外,我们发现没有发布没有漏洞,因此即使它们部署最新的软件包,部署者也无法避免漏洞。我们为集装箱开发商提供了一些经验教训,在他们可以遵循的策略方面,以尽量减少漏洞的数量。我们认为Docker容器扫描和安全管理工具应该通过添加有关其他类型的错误的数据来改进其平台,并包括提供技术滞后的测量,以便提供何时更新的部署者信息。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号