• @[email protected]
    link
    fedilink
    110 months ago

    What are the hackers doing in my container in the first place? And how did they drop to shell?

    • @[email protected]OP
      link
      fedilink
      110 months ago

      Maybe if you try to run fishy apps on containers then the hacker can exploit out of the container. I guess that’s a possible scenario 🤔

      • @[email protected]
        link
        fedilink
        110 months ago

        Possibly - so if I keep staying clear of fishy apps I’d be fine.

        Does this affect lxc/d as welll?

        • @[email protected]OP
          link
          fedilink
          210 months ago

          It affects mainly docker and kubernets containers. I did a little research and apparently docker isn’t based of lxc/lxd anymore, so I suppose that it doesn’t affect those. Although I’m not sure what kubernets is based off

          • @[email protected]
            link
            fedilink
            410 months ago

            Kubernetes and docker both use containerd, which in turn uses runc which is what the vulnerability is in.