this post was submitted on 05 Feb 2024
11 points (100.0% liked)

Security

5014 readers
1 users here now

Confidentiality Integrity Availability

founded 4 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[โ€“] [email protected] 1 points 9 months ago (4 children)

What are the hackers doing in my container in the first place? And how did they drop to shell?

[โ€“] [email protected] 1 points 9 months ago (1 children)

Maybe if you try to run fishy apps on containers then the hacker can exploit out of the container. I guess that's a possible scenario ๐Ÿค”

[โ€“] [email protected] 1 points 9 months ago (1 children)

Possibly - so if I keep staying clear of fishy apps Iโ€™d be fine.

Does this affect lxc/d as welll?

[โ€“] [email protected] 2 points 9 months ago (1 children)

It affects mainly docker and kubernets containers. I did a little research and apparently docker isn't based of lxc/lxd anymore, so I suppose that it doesn't affect those. Although I'm not sure what kubernets is based off

[โ€“] [email protected] 4 points 9 months ago

Kubernetes and docker both use containerd, which in turn uses runc which is what the vulnerability is in.

load more comments (2 replies)