Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This requires you to give your normal user the ability to execute stuff via docker. This means that given the ability to execute code as the user, an attacker can trivially gain root access.



I think in this context that's not a real concern, as on most laptop the human user has root equivalent permissions anyway (via sudo). In addition, Docker supports user namespaces, allowing you to have root in container being mapped to a non root user.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: