BlanK0@lemmy.ml to Security@lemmy.ml · 10 months agoLeaky Vessels flaws allow hackers to escape Docker, runc containerswww.bleepingcomputer.comexternal-linkmessage-square5fedilinkarrow-up111arrow-down10cross-posted to: securitynews@infosec.publinux@lemmy.mlselfhosted@lemmy.world
arrow-up111arrow-down1external-linkLeaky Vessels flaws allow hackers to escape Docker, runc containerswww.bleepingcomputer.comBlanK0@lemmy.ml to Security@lemmy.ml · 10 months agomessage-square5fedilinkcross-posted to: securitynews@infosec.publinux@lemmy.mlselfhosted@lemmy.world
minus-squareOisteinklinkfedilinkarrow-up2arrow-down1·10 months agoWhat are the hackers doing in my container in the first place? And how did they drop to shell?
minus-squareBlanK0@lemmy.mlOPlinkfedilinkarrow-up1·10 months agoMaybe if you try to run fishy apps on containers then the hacker can exploit out of the container. I guess that’s a possible scenario 🤔
minus-squareOisteinklinkfedilinkarrow-up2arrow-down1·10 months agoPossibly - so if I keep staying clear of fishy apps I’d be fine. Does this affect lxc/d as welll?
minus-squareBlanK0@lemmy.mlOPlinkfedilinkarrow-up2·10 months agoIt affects mainly docker and kubernets containers. I did a little research and apparently docker isn’t based of lxc/lxd anymore, so I suppose that it doesn’t affect those. Although I’m not sure what kubernets is based off
minus-squareMaienM@sopuli.xyzlinkfedilinkarrow-up4·10 months agoKubernetes and docker both use containerd, which in turn uses runc which is what the vulnerability is in.
What are the hackers doing in my container in the first place? And how did they drop to shell?
Maybe if you try to run fishy apps on containers then the hacker can exploit out of the container. I guess that’s a possible scenario 🤔
Possibly - so if I keep staying clear of fishy apps I’d be fine.
Does this affect lxc/d as welll?
It affects mainly docker and kubernets containers. I did a little research and apparently docker isn’t based of lxc/lxd anymore, so I suppose that it doesn’t affect those. Although I’m not sure what kubernets is based off
Kubernetes and docker both use containerd, which in turn uses runc which is what the vulnerability is in.