TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Analysis on Docker Hub malicious images: Attacks through public container images

70 点作者 e-Minguez超过 2 年前

9 条评论

Doubleslash超过 2 年前
The segmentation into attack vectors is interesting. But images from individuals on something like DockerHub have always been untrusted. I expected to read here about recent compromised official DockerHub library images.<p>I don&#x27;t see how that threat is new or now more pressing than ever. How would you even count something like `docker pull vesnpsexga&#x2F;joomla` as typosquatting vs. `docker pull joomla`? It&#x27;s not even close.<p>Users should limit there container runtime&#x2F;podman&#x2F;docker access to docker.io&#x2F;library or use a pull-thru caching feature of their own registry to bring in stuff from hand-selected places in public registries like docker.io or quay.io to environments behind the firewall.
评论 #33723784 未加载
评论 #33731246 未加载
coffeeblack超过 2 年前
Does every “registry” or “hub” have to repeat the same mistakes? It’s not like the same didn’t happened on pypi, npm, crates, and who knows how many others.
评论 #33722902 未加载
hermanb超过 2 年前
Honestly, this seems like little. We should be wary of the source we try to pull, but given how easy it is to upload something malicious you’d expect thousands of images of this kind. Maybe DockerHub is already detecting and deleting these packages?<p>Or why aren’t more people interested in this?<p>Not sure, but maybe injecting into commonly used libraries via subdependencies is seen as a more effective method, getting more focus. Would be interesting to have a broader analysis of malicious artifacts!
kjok超过 2 年前
Given that these malicious images seem esoteric (only a few hundred downloads), is this even a threat? Most companies have private mirrors that protect against such attacks.
评论 #33723553 未加载
Yeroc超过 2 年前
This sounds like much-ado about nothing. We probably need to be far more concerned about &quot;Docker Official Image&quot;s that have been deprecated and are no longer receiving updates such as the &quot;official&quot; &#x2F;_centos images (including centos7 which in theory isn&#x27;t EOL but RedHat apparently doesn&#x27;t care).
评论 #33726245 未加载
egberts1超过 2 年前
A couple hundred downloads?<p>These kinds of repository are probably best used by drive-by malware.<p>I think this (and all) repository&#x27;s download log should be made open, or at least made viewable prior to your downloading step as part of the trust profiling.
exabrial超过 2 年前
Don&#x27;t use Docker. Use <i>heavy sigh</i> systemd security features. Yes, this is something that systemd actually does really well. And it keeps all your processes and files visible and inspectable to standard unix tools (ps, htop, ls, etc).<p>* chroot * cgroups * PrivateNetwork * PrivateTmp * isolated devices * IPAddressAllow * SocketBindAllow * ReadOnlyPaths<p><a href="https:&#x2F;&#x2F;docs.arbitrary.ch&#x2F;security&#x2F;systemd.html" rel="nofollow">https:&#x2F;&#x2F;docs.arbitrary.ch&#x2F;security&#x2F;systemd.html</a>
评论 #33727409 未加载
TekMol超过 2 年前
With Docker, how well is the host protected from malicious images?
评论 #33724445 未加载
评论 #33722316 未加载
评论 #33725730 未加载
naikrovek超过 2 年前
this is all trending to a point where the number available libraries for an ecosystem will be seen as a liability rather than an asset.