Docker security in the future (Opensource.com)
One of the problems with all of the container separation modes described here and elsewhere is that they all rely on the kernel for separation. Unlike air gapped computers, or even virtual machines, the processes within the container can talk directly to the host kernel. If the host kernel has a kernel vulnerability that a container can access, they might be able to disable all of the security and break out of the container. The x86_64 Linux kernel has over 600 system calls, a bug in any one of which could lead to a privilege escalation. Some of the system calls are seldom called, and should be eliminated from access within the container."
Posted Mar 22, 2015 17:30 UTC (Sun)
by justincormack (subscriber, #70439)
[Link]
Posted Mar 23, 2015 16:26 UTC (Mon)
by jhoblitt (subscriber, #77733)
[Link] (1 responses)
Posted Mar 26, 2015 12:00 UTC (Thu)
by smitty_one_each (subscriber, #28989)
[Link]
Docker security in the future (Opensource.com)
Docker security in the future (Opensource.com)
Docker security in the future (Opensource.com)