Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Most, I think Debian has patch to be disabled at runtime via sysctl. The reason is that most containers or sandboxing techniques are root only unless you mix it with user namescapes. So most container or sandbox software use suid(firejail) , root daemon(docker) or user namescapes (podman and flatpak). Looking at the cves, user namespaces is probably the safer option


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: