TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Critical Bug in Docker Engine Allowed Attackers to Bypass Authorization Plugins

64 点作者 jebby10 个月前

4 条评论

erickj10 个月前
Hmmm... It&#x27;s as though running root privelege daemons with open sockets could go wrong. Who could have known.<p><a href="https:&#x2F;&#x2F;developers.redhat.com&#x2F;blog&#x2F;2020&#x2F;09&#x2F;25&#x2F;rootless-containers-with-podman-the-basics#why_podman_" rel="nofollow">https:&#x2F;&#x2F;developers.redhat.com&#x2F;blog&#x2F;2020&#x2F;09&#x2F;25&#x2F;rootless-conta...</a>
评论 #41105972 未加载
compsciphd10 个月前
Are there really good use cases for dockerd being exposed to the network?<p>I would assume (many&#x2F;most) users who run docker directly run it without api access on the network (i.e. on a single host).<p>Even those that do want network deployments of docker, probably run it through something like k8s where again kubernetes is handling the networking side, and each dockerd doesn&#x27;t need to expose a network accessible api).<p>just wondering the use case for this.
评论 #41102893 未加载
评论 #41104357 未加载
评论 #41102606 未加载
评论 #41103690 未加载
评论 #41105704 未加载
jroseattle10 个月前
&gt; The vulnerability was addressed with the release of Docker Engine v18.09.1, but it was not included in subsequent major versions, causing a regression.<p>Without further information, this sounds like code introduced in a hotfix that wasn&#x27;t merged back to feature branches.<p>Surely it&#x27;s not that simple?
mass_and_energy10 个月前
How does this affect CaaS-based deployments like AKS, EKS, GKE and the like?
评论 #41102552 未加载
评论 #41102449 未加载