Karna@lemmy.ml to Linux@lemmy.ml · 10 months agoLeaky Vessels flaws allow hackers to escape Docker, runc containerswww.bleepingcomputer.comexternal-linkmessage-square5fedilinkarrow-up193arrow-down10cross-posted to: security@lemmy.mlsecuritynews@infosec.pubselfhosted@lemmy.world
arrow-up193arrow-down1external-linkLeaky Vessels flaws allow hackers to escape Docker, runc containerswww.bleepingcomputer.comKarna@lemmy.ml to Linux@lemmy.ml · 10 months agomessage-square5fedilinkcross-posted to: security@lemmy.mlsecuritynews@infosec.pubselfhosted@lemmy.world
minus-squarejbk@discuss.tchncs.delinkfedilinkarrow-up5·10 months agoWouldn’t rootless containers have reduced the impact of these vulnerabilities? I’ll happily continue using rootless podman for simple tasks
minus-squareKarna@lemmy.mlOPlinkfedilinkarrow-up3·edit-210 months agoDocker can be run in rootless mode[1]. Ideally that should be the standard mode unless you have specific requirements not satisfied by rootless mode. [1] https://docs.docker.com/engine/security/rootless/
Wouldn’t rootless containers have reduced the impact of these vulnerabilities? I’ll happily continue using rootless podman for simple tasks
Docker can be run in rootless mode[1]. Ideally that should be the standard mode unless you have specific requirements not satisfied by rootless mode.
[1] https://docs.docker.com/engine/security/rootless/