Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Note CVE-2025-31133 requires one of: (1) persistent container (2) attacker-controlled image. That means that as long as you always use "docker run" on known images (as opposed to "docker start"), you cannot be exploited via that bug even if the service itself is compromised.

I am not saying that you should never update the OS, but a lot of of those container escapes have severe restrictions and may not apply to your specific config.





Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: