CVE-2019-5736: runc container breakout
CVE-2019-5736: runc container breakout
Posted Feb 14, 2019 0:38 UTC (Thu) by wahern (subscriber, #37304)In reply to: CVE-2019-5736: runc container breakout by ibukanov
Parent article: CVE-2019-5736: runc container breakout
The distinction between being "truly" out of memory and only being out of memory because of policy seems contrived and irrelevant, particularly in the era of nested containers and VMs.
In the context of a language like Go or Perl or simple C utilities or similar languages, aborting on allocation failure (rather than trying to implement the runtime in a way that makes it recoverable) is excused as a reasonable cost-benefit tradeoff as these programs are typically executed circumscribed contexts (microservices, CGI scripts) where the possibility of meaningful recover by higher layers up the stack is retained. But locking up the application? Sure, being able to attach a debugger has some utility, just as being able to attach a debugger to a car's breaking system which decided to fail in an open state as a convenience for the engineers. But that's hardly the most reasonable or desirable behavior in the vast majority of contexts.
