2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER) 2019
DOI: 10.1109/saner.2019.8668013
|View full text |Cite
|
Sign up to set email alerts
|

On the Relation between Outdated Docker Containers, Severity Vulnerabilities, and Bugs

Abstract: Packaging software into containers is becoming a common practice when deploying services in cloud and other environments. Docker images are one of the most popular container technologies for building and deploying containers. A container image usually includes a collection of software packages, that can have bugs and security vulnerabilities that affect the container health. Our goal is to support container deployers by analysing the relation between outdated containers and vulnerable and buggy packages instal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 53 publications
(28 citation statements)
references
References 19 publications
0
28
0
Order By: Relevance
“…They offer isolation, portability and reusability by providing all needed artifacts and dependencies shipped in one package. However, as shown in previous research [4], [27], [18], Docker containers may contain vulnerable and outdated packages that may put at risk the environments where the containers are deployed. Nevertheless, little support is given to practitioners and researchers desiring to assess the status of their containers, thus forcing them to resort to the tedious task of writing error-prone ad-hoc scripts.…”
Section: Discussionmentioning
confidence: 86%
See 2 more Smart Citations
“…They offer isolation, portability and reusability by providing all needed artifacts and dependencies shipped in one package. However, as shown in previous research [4], [27], [18], Docker containers may contain vulnerable and outdated packages that may put at risk the environments where the containers are deployed. Nevertheless, little support is given to practitioners and researchers desiring to assess the status of their containers, thus forcing them to resort to the tedious task of writing error-prone ad-hoc scripts.…”
Section: Discussionmentioning
confidence: 86%
“…The dataset contains different information related to software packages installed in containers, thus providing a powerful basis to perform empirical studies. As an example, we have used ConPan in previous work [27], where we empirically analyzed installed system packages in a large dataset of Docker Hub images that are based on the Debian Linux distribution.…”
Section: Reportingmentioning
confidence: 99%
See 1 more Smart Citation
“…The list of these official projects is available on GitHub, with 138 official projects, as of March 2019. 10 Some of these projects share a same Github repository. For example, InfluxDB and Chronograf are maintained in the same GitHub repository.…”
Section: A Repositoriesmentioning
confidence: 99%
“…They also indicate that the RUN instruction is the most commonly used instruction in Dockerfiles which can be linked to our results in Section V-A where we indicate that RUN instructions are the most frequently duplicated. Zerouali et al [10] perform an empirical analysis on 7,380 official and community Docker images that are based on the Debian Linux distribution. They look at the relation between outdated containers and vulnerable and buggy packages.…”
Section: Related Workmentioning
confidence: 99%