Shimitar@feddit.it 11 months ago
Don’t run docker, so far it has proven quite insecure, and that was by design at first because docker was created for development environments and not for deployment.
Later docker added better security, because they understood the value in deployment too. But many distro are still insecure by default and it takes both the effort of sysadmins and image developers to deploy securely docker containers.
I switched to Podman: no daemon, no socket, no root operations out of the box. And the transition is basically seamless too.
redcalcium@lemmy.institute 11 months ago
I believe podman and containerd use
runc
so they’re also affected by this container escape vulnerability.Shimitar@feddit.it 11 months ago
Podman can use different tools under the hood, will check which one I am using.
redcalcium@lemmy.institute 11 months ago
I think on redhat/fedora it uses runc by default and on debian/arch it uses crun by default.