• FackCurs@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 day ago

    I indeed use a container. Wasn’t familiar with the update process for containers but now know how to do it.

    • communism@lemmy.ml
      link
      fedilink
      English
      arrow-up
      0
      ·
      8 hours ago

      If you haven’t already, I recommend Watchtower (nickfedor fork—the original is unmaintained) which automatically pulls updates to Docker containers and restarts them. Make sure to track latest, although for security updates, these should be backported to any supported versions so it’s fine to track an older supported version too.

      • mic_check_one_two@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        0
        ·
        15 hours ago

        Implying you have access to some major Docker 0-day exploit, or just talking out of your ass? Because a container is no more or less secure than the machine it runs on. At least if a container gets compromised, it only has access to the volumes you have specifically given it access to. It can’t just run rampant on your entire system, because you haven’t (or at least shouldn’t have) given it access to your entire system.

        • quick_snail@feddit.nl
          link
          fedilink
          English
          arrow-up
          0
          ·
          10 hours ago

          Docker is known insecure. It doesn’t verify any layers it pulls cryptography. The devs are aware. The tickets remain open.

          • def@aussie.zone
            link
            fedilink
            English
            arrow-up
            0
            ·
            6 hours ago

            If that is indeed true it would only mean that the docker container is vulnerable to a supply chain attack. You are not any more vulnerable to a vulnerability in the codebase.

            If you’re using the ghcr image, to post malicious code there, the attack would have already had to compromise their github infra … which would likely result in the attacker being able to push malicious code to git or publish malicious releases. Their linux distro packages are self published via a ppa/install script, which I would assume just pull from their github releases, so a bad github release would immediately be pulled as an update by users just as fast as a container.

    • ButtDrugs@lemmy.zip
      link
      fedilink
      English
      arrow-up
      0
      ·
      21 hours ago

      There’s a lot of good container management solutions out there that are worth investigating. They do things like monitor availability, resource management, as well as altering on versioning.