Skip to content

This should be stated that this is very dangerous. #8

@rhatdan

Description

@rhatdan

If a container process gains access to this socket or the podman socket then it has full control on the system. IE Full root.
Basically the container process does a

docker run --ti --privileged fedora sh and it has a full root running process on the system, and only needs to escape mount namespace.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions