首页> 外文会议>IEEE International Conference on Software Analysis, Evolution, and Reengineering >On the Relation between Outdated Docker Containers, Severity Vulnerabilities, and Bugs
【24h】

On the Relation between Outdated Docker Containers, Severity Vulnerabilities, and Bugs

机译:关于过时的Docker容器,严重性漏洞和错误之间的关系

获取原文

摘要

Packaging software into containers is becoming a common practice when deploying services in cloud and other environments. Docker images are one of the most popular container technologies for building and deploying containers. A container image usually includes a collection of software packages, that can have bugs and security vulnerabilities that affect the container health. Our goal is to support container deployers by analysing the relation between outdated containers and vulnerable and buggy packages installed in them. We use the concept of technical lag of a container as the difference between a given container and the most up-to-date container that is possible with the most recent releases of the same collection of packages. For 7,380 official and community Docker images that are based on the Debian Linux distribution, we identify which software packages are installed in them and measure their technical lag in terms of version updates, security vulnerabilities and bugs. We have found, among others, that no release is devoid of vulnerabilities, so deployers cannot avoid vulnerabilities even if they deploy the most recent packages. We offer some lessons learned for container developers in regard to the strategies they can follow to minimize the number of vulnerabilities. We argue that Docker container scan and security management tools should improve their platforms by adding data about other kinds of bugs and include the measurement of technical lag to offer deployers information of when to update.
机译:在云和其他环境中部署服务时,将软件打包到容器中已成为一种惯例。 Docker映像是用于构建和部署容器的最受欢迎的容器技术之一。容器映像通常包括一组软件包,这些软件包可能包含影响容器健康的错误和安全漏洞。我们的目标是通过分析过时的容器与安装在其中的易受攻击的和有漏洞的程序包之间的关系来支持容器部署人员。我们将容器的技术滞后的概念用作给定容器和最新容器之间的差异,而最新容器是同一软件包集合的最新版本。对于基于Debian Linux发行版的7,380个官方和社区Docker映像,我们确定其中安装了哪些软件包,并根据版本更新,安全漏洞和错误来衡量其技术滞后。我们发现,除其他外,没有任何发行版没有漏洞,因此即使部署者部署了最新的软件包,部署者也无法避免漏洞。我们为容器开发人员提供了一些经验教训,内容涉及容器开发人员可以采取的最小化漏洞数量的策略。我们认为Docker容器扫描和安全管理工具应通过添加有关其他类型错误的数据来改善其平台,并包括对技术滞后的度量,以为部署人员提供何时更新的信息。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号