BlanK0@lemmy.ml to Security@lemmy.ml · 9 months agoLeaky Vessels flaws allow hackers to escape Docker, runc containerswww.bleepingcomputer.comexternal-linkmessage-square4fedilinkarrow-up11arrow-down10cross-posted to: linux@lemmy.ml
arrow-up11arrow-down1external-linkLeaky Vessels flaws allow hackers to escape Docker, runc containerswww.bleepingcomputer.comBlanK0@lemmy.ml to Security@lemmy.ml · 9 months agomessage-square4fedilinkcross-posted to: linux@lemmy.ml
minus-squareOisteink@feddit.nllinkfedilinkarrow-up0·9 months agoWhat are the hackers doing in my container in the first place? And how did they drop to shell?
minus-squareBlanK0@lemmy.mlOPlinkfedilinkarrow-up0·9 months agoMaybe if you try to run fishy apps on containers then the hacker can exploit out of the container. I guess that’s a possible scenario 🤔
minus-squareOisteink@feddit.nllinkfedilinkarrow-up0·9 months agoPossibly - so if I keep staying clear of fishy apps I’d be fine. Does this affect lxc/d as welll?
minus-squareBlanK0@lemmy.mlOPlinkfedilinkarrow-up0·9 months agoIt affects mainly docker and kubernets containers. I did a little research and apparently docker isn’t based of lxc/lxd anymore, so I suppose that it doesn’t affect those. Although I’m not sure what kubernets is based off
What are the hackers doing in my container in the first place? And how did they drop to shell?
Maybe if you try to run fishy apps on containers then the hacker can exploit out of the container. I guess that’s a possible scenario 🤔
Possibly - so if I keep staying clear of fishy apps I’d be fine.
Does this affect lxc/d as welll?
It affects mainly docker and kubernets containers. I did a little research and apparently docker isn’t based of lxc/lxd anymore, so I suppose that it doesn’t affect those. Although I’m not sure what kubernets is based off