Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

11:35 AM

Containers for Data Analysis Are Rife With Vulnerabilities

Old software components and the inclusion of unnecessary code created a massive attack surface area in containers for scientific analysis, researchers say.

Regularly updating software components can eliminate two-thirds of the vulnerabilities found in container images, while minimizing the number of libraries can also reduce the attack surface area in some cases, according to research by a team at Concordia University in Montreal.

The research, which focused on containerized applications used in high-performance computing (HPC) environments for neuroimage processing, analyzed 44 container images using vulnerability scanners and found that the average container image had more than 320 vulnerabilities. Containers based on lightweight Linux distributions, such as Alpine Linux, had far fewer vulnerabilities, suggesting that minimizing the volume of code can also reduce the number of vulnerabilities, the research team said in a paper posted online last week.

Related Content:

Container Security Is Falling Behind Container Deployments

The Changing Face of Threat Intelligence

New on The Edge: 9 Cyber Disaster-Recovery Planning Tips for a Disaster-Prone Time

While the researchers focused on containerized applications of analyzing images of the brain, the issue with vulnerabilities is not particular to that discipline or data science packages, says Tristan Glatard, associate professor in the department of computer science and software engineering at Concordia University.

"The problem is general — it's not specific to a particular data analysis software or OS distribution," says Glatard. "There is no particularly bad guy. ... We didn't find any particular origin of vulnerabilities."

The research highlights that updating the packages included in images is a proven way for users of Docker and Singularity containers to reduce the number of vulnerabilities in the software. Last year, for example, one survey of Docker images found that 60% had at least one moderate vulnerability, while 20% had at least one high-risk vulnerability. Unfortunately, data scientists, like enterprise IT workers, are often leery that updates may break critical software.

The researchers, however, urged other scientists and data specialists to become more proactive about container security.

"[I]n neuroimaging, as in other disciplines, software updates are generally discouraged because they can affect analysis results by introducing numerical perturbations in the computations," the researchers stated in the paper. "We believe that this position is not viable from an IT security perspective, and that it could endanger the entire Big Data processing infrastructure, starting with the HPC centers."

The research team used a script to determine the package manager for a specific image and then ran the manager's update function to install the most recent software versions. Both the original image and updated images were scanned with a variety of vulnerability scanners: Anchore, Vuls, and Clair for Docker images, and the Singularity Container Tools for Singularity images.

The number of vulnerabilities found varied from about 1,700 for one image to nearly zero for a handful of others. While the average number of vulnerabilities per image was 460, the median image had 321 vulnerabilities. The number depended fairly linearly on the number of packages, with about 1.7 security issues discovered per software component on average, according to the research. Updating the containers, however, removed almost two-thirds of the security issues, lowering the vulnerability density to an average of about 0.6 per software package.

Minimizing the number of packages often reduced the number of vulnerabilities, but the impact was uneven. In some cases, removing unnecessary packages had no impact, especially when there were few extraneous packages. However, using the Alpine Linux distribution — a minimal version of Linux commonly used as a base image in Docker containers — typically reduced the attack surface area, says Glatard.

"Container images based on Alpine Linux are an exception, though: They have less vulnerabilities overall," he says. "This isn't because of better software or anything else [other] than limiting the number of software packages present in Alpine Linux images."

As with enterprise software, data scientists are often concerned that updates will break — or, at least, change — their analyses, and so they avoid updating the software components in an image, says Concordia's Glatard. He urged image users to regularly check whether they are using the latest software.

"I think data scientists should aim at minimizing software dependencies in container images and update them," he says. "Updates, however, can be a bit tricky, as in some cases they might change the outcome of analyses. Currently, you don't want to update software in the midst of an experiment, as it might introduce a bias in your results."

In addition, data scientists and the users of scientific software should make their analyses more robust to changes, which can ensure that software updates don't affect the results of data analysis.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-23
An improper authorization of using debugging command in Secure Folder prior to SMR Oct-2020 Release 1 allows unauthorized access to contents in Secure Folder via debugging command.
PUBLISHED: 2021-04-23
Apache Maven will follow repositories that are defined in a dependency’s Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be t...
PUBLISHED: 2021-04-23
In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the snapper.diff function...
PUBLISHED: 2021-04-23
The xmlhttprequest-ssl package before 1.6.1 for Node.js disables SSL certificate validation by default, because rejectUnauthorized (when the property exists but is undefined) is considered to be false within the https.request function of Node.js. In other words, no certificate is ever rejected.
PUBLISHED: 2021-04-22
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromi...