Hacker News new | past | comments | ask | show | jobs | submit login

I have been learning about containers fairly recently. What are these security vulnerabilities that the post talks about? I haven't come across any docs that mention security yet.



It's mainly an attack surface issue. A process running in a Linux container is just a process running in a regular OS with some extra bells and whistles for resource constraints and isolation. So when it comes to making a kernel call, it's a call directly to the same kernel all of the other containers are calling.

This means the entire kernel/userspace API is the attack surface for a malicious container. Compare that to a VM where the attack surface is the API the hypervisor exposes to a virtual machine.

It's not that the former is necessarily smaller, it's just that the modus operandi in systems administration has always been that if a person executes malicious code as a user on the OS, you better wipe the system because kernel vulnerabilities aren't treated with the same severity of hypervisor vulnerabilities.

This is the reason your containers are actually executed in a dedicated VM if you use something like GCE.



Earlier implementations had bugs like this http://blog.bofh.it/debian/id_413




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: