Code Execution in Alpine Linux Impacts Containers

For discussions about security.
Post Reply
Message
Author
belham2
Posts: 1715
Joined: Mon 15 Aug 2016, 22:47

Code Execution in Alpine Linux Impacts Containers

#1 Post by belham2 »

https://www.securityweek.com/code-execu ... containers



....ouch even for all us in Linux land.....they are a'coming for us eventually...resistance is futile :?

User avatar
rufwoof
Posts: 3690
Joined: Mon 24 Feb 2014, 17:47

#2 Post by rufwoof »

One of the primary advantages of Debian is its central repository with thousands of software packages. If you're coming to Debian from another operating system, you might be used to installing software that you find on random websites. On Debian installing software from random websites is bad
In the case of Debian, add additional repo's outside of Debian's own repo's and you create a FrankenDebian. Repo's typically have direct access to your root. In Alpine's case its insecure transport of packages that potentially enables a man-in-middle injection of malicious code/activity. In contrast run a DebianDog for instance and you're handing out your systems root access on a platter.
[size=75]( ͡° ͜ʖ ͡°) :wq[/size]
[url=http://murga-linux.com/puppy/viewtopic.php?p=1028256#1028256][size=75]Fatdog multi-session usb[/url][/size]
[size=75][url=https://hashbang.sh]echo url|sed -e 's/^/(c/' -e 's/$/ hashbang.sh)/'|sh[/url][/size]

Post Reply