Back to News
Advertisement
Advertisement

⚡ Community Insights

Discussion Sentiment

40% Positive

Analyzed from 342 words in the discussion.

Trending Topics

#containers#bugs#attack#surface#bug#security#more#hardware#exploit#against

Discussion (10 Comments)Read Original on HackerNews

exceptioneabout 10 hours ago
FYI: I had tried this exploit with rootless podman containers to write to read-only mounts, but the exploit failed. I am not sure if the default container runtime in Podman is resistant against these attacks or if it assumes Docker running containers with higher privileges, but at least it was a pleasant observation. (kernel 6.18)
tptacekabout 5 hours ago
Are you not using OverlayFS? The exploit vector here relies on OverlayFS. What you want to reason about generally is (a) whether you have AF_ALG sockets exposed and (b) whether attackers have access to files (via inode) whose cached contents will affect other processes.
AlfieJonesabout 10 hours ago
It feels like AI is speeding up bug discovery faster than security can keep up. Curious if this is temporary or just the new normal.
bbmpabout 9 hours ago
It only getting worse now that AI is also writing bug faster than humans
l23k4about 3 hours ago
> faster than security can keep up

What does that even mean? Bugs are finite, at some point they'll just all be patched and you'll be left with bug-free software.

AI bug discovery getting better is an incredible advantage for defenders.

louwrentiusabout 10 hours ago
Maybe I’m missing something but because of this kind of risk, an old fashioned virtual machine feels like a more robust security boundary.
itintheoryabout 8 hours ago
<always has been meme>

While containers have some useful properties, it was never intended to be, and never really functioned as a strict security boundary. We've duct-taped around that, and it's reasonably good now, but that only goes so far.

kevincoxabout 3 hours ago
The fundamental problem is that the kernel is just too huge of an attack surface. It is probably always going to have exploitable bugs. A VM (especially hardware assisted) is a relatively tiny attack surface and it shows in the amount of bugs found.

I typically say that containers (and any other isolation that shares a kernel) are good for "mostly trusted" workloads, like different teams at the same company. You want isolation against accidents more than intentional attacks.

VMs are good for just about everything if you are careful (for example what devices and hardware are exposed) but if you want ultimate isolation you want completely separate hardware. It is the only way to be sure against hardware bugs and side-channels or VM bugs.

1970-01-01about 5 hours ago
Robust goes both ways. It's a layer. That means it's both a boundary and an attack surface. More is..more.
hun3about 8 hours ago
No, "virtual machine" alone doesn't make things safer.

Shrink your attack surface.

Use a completely locked down seccomp. Use nsjail or gVisor for containers. Use microvm or libkrun for full OS.

Lesser attack surface is what matters. Virtualization is only half of the story.