You must log in or # to comment.
What are the hackers doing in my container in the first place? And how did they drop to shell?
Maybe if you try to run fishy apps on containers then the hacker can exploit out of the container. I guess that鈥檚 a possible scenario 馃
Possibly - so if I keep staying clear of fishy apps I鈥檇 be fine.
Does this affect lxc/d as welll?
It affects mainly docker and kubernets containers. I did a little research and apparently docker isn鈥檛 based of lxc/lxd anymore, so I suppose that it doesn鈥檛 affect those. Although I鈥檓 not sure what kubernets is based off
Kubernetes and docker both use containerd, which in turn uses runc which is what the vulnerability is in.