What are the hackers doing in my container in the first place? And how did they drop to shell?
this post was submitted on 05 Feb 2024
11 points (100.0% liked)
Security
5005 readers
2 users here now
Confidentiality Integrity Availability
founded 4 years ago
MODERATORS
Maybe if you try to run fishy apps on containers then the hacker can exploit out of the container. I guess that's a possible scenario ๐ค
Possibly - so if I keep staying clear of fishy apps Iโd be fine.
Does this affect lxc/d as welll?
It affects mainly docker and kubernets containers. I did a little research and apparently docker isn't based of lxc/lxd anymore, so I suppose that it doesn't affect those. Although I'm not sure what kubernets is based off
Kubernetes and docker both use containerd, which in turn uses runc which is what the vulnerability is in.