Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I feel like you and grandparent are the only people who read the article, because I'm wondering the same thing.

The article never properly explains how the attack happened. Having a port exposed to the internet on any container is a remote execution vulnerability? What? How? Nobody would be using docker in that case.

The article links to a blog post as a source on the vulnerability, but the article is a general "how to secure" article, there is nothing about remote code execution.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: