TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Critical Bug in Docker Engine Allowed Attackers to Bypass Authorization Plugins

64 pointsby jebby10 months ago

4 comments

erickj10 months ago
Hmmm... It&#x27;s as though running root privelege daemons with open sockets could go wrong. Who could have known.<p><a href="https:&#x2F;&#x2F;developers.redhat.com&#x2F;blog&#x2F;2020&#x2F;09&#x2F;25&#x2F;rootless-containers-with-podman-the-basics#why_podman_" rel="nofollow">https:&#x2F;&#x2F;developers.redhat.com&#x2F;blog&#x2F;2020&#x2F;09&#x2F;25&#x2F;rootless-conta...</a>
评论 #41105972 未加载
compsciphd10 months ago
Are there really good use cases for dockerd being exposed to the network?<p>I would assume (many&#x2F;most) users who run docker directly run it without api access on the network (i.e. on a single host).<p>Even those that do want network deployments of docker, probably run it through something like k8s where again kubernetes is handling the networking side, and each dockerd doesn&#x27;t need to expose a network accessible api).<p>just wondering the use case for this.
评论 #41102893 未加载
评论 #41104357 未加载
评论 #41102606 未加载
评论 #41103690 未加载
评论 #41105704 未加载
jroseattle10 months ago
&gt; The vulnerability was addressed with the release of Docker Engine v18.09.1, but it was not included in subsequent major versions, causing a regression.<p>Without further information, this sounds like code introduced in a hotfix that wasn&#x27;t merged back to feature branches.<p>Surely it&#x27;s not that simple?
mass_and_energy10 months ago
How does this affect CaaS-based deployments like AKS, EKS, GKE and the like?
评论 #41102552 未加载
评论 #41102449 未加载