zlacker

[parent] [thread] 6 comments
1. ronsor+(OP)[view] [source] 2025-12-17 21:52:36
There would be, but a lot of docker containers are misconfigured or unnecessarily privileged, allowing for escape.

Also, if you've been compromised, you may have a rootkit that hides itself from the filesystem, so you can't be sure of a file's existence through a simple `ls` or `stat`.

replies(1): >>milady+0j
2. milady+0j[view] [source] 2025-12-17 23:53:03
>>ronsor+(OP)
> but a lot of docker containers are misconfigured or unnecessarily privileged, allowing for escape

Honestly, citation needed. Very rare unless you're literally giving the container access to write to /usr/bin or other binaries the host is running, to reconfigure your entire /etc, access to sockets like docker's, or some other insane level of over reach I doubt even the least educated docker user would do.

While of course they should be scoped properly, people act like some elusive 0-day container escape will get used on their minecraft server or personal blog that has otherwise sane mounts, non-admin capabilities, etc. You arent that special.

replies(3): >>fomine+3y >>cyphar+uM >>vultou+Wk1
◧◩
3. fomine+3y[view] [source] [discussion] 2025-12-18 02:09:21
>>milady+0j
I've seen many articles with `-v /var/run/docker.sock:/var/run/docker.sock` without scary warning
replies(1): >>boomli+M81
◧◩
4. cyphar+uM[view] [source] [discussion] 2025-12-18 05:11:49
>>milady+0j
As a maintainer of runc (the runtime Docker uses), if you aren't using user namespaces (which is the case for the vast majority of users) I would consider your setup insecure.

And a shocking number of tutorials recommend bind-mounting docker.sock into the container without any warning (some even tell you to mount it "ro" -- which is even funnier since that does nothing). I have a HN comment from ~8 years ago complaining about this.

◧◩◪
5. boomli+M81[view] [source] [discussion] 2025-12-18 09:11:18
>>fomine+3y
What would the intended use case for that be?
replies(1): >>jp1919+l83
◧◩
6. vultou+Wk1[view] [source] [discussion] 2025-12-18 11:01:02
>>milady+0j
Half the vendor software I come across asks you to mount devices from the host, add capabilities or run the container in privileged mode because their outsourced lowest bidder developers barely even know what a container is. I doubt even the smallest minority of their customers protest against this because apparently the place I work at is always the first one to have a problem with it.
◧◩◪◨
7. jp1919+l83[view] [source] [discussion] 2025-12-18 20:21:28
>>boomli+M81
Diun
[go to top]