home.social

#dockerengine — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #dockerengine, aggregated by home.social.

  1. Docker Flaw Exposes Hosts to Unauthorized Access

    A recent security patch meant to tighten up Docker Engine's defenses has left a gaping hole, exposing hosts to unauthorized access - and it's up to you to make sure you're not the one who gets exploited. A high-severity flaw, tracked as CVE-2026-34040, allows attackers to bypass authorization plugins and potentially gain access to your host.

    osintsights.com/docker-flaw-ex

    #Docker #Cve202634040 #AuthorizationBypass #Containerization #DockerEngine

  2. Docker Flaw Exposes Hosts to Unauthorized Access

    A recent security patch meant to tighten up Docker Engine's defenses has left a gaping hole, exposing hosts to unauthorized access - and it's up to you to make sure you're not the one who gets exploited. A high-severity flaw, tracked as CVE-2026-34040, allows attackers to bypass authorization plugins and potentially gain access to your host.

    osintsights.com/docker-flaw-ex

    #Docker #Cve202634040 #AuthorizationBypass #Containerization #DockerEngine

  3. #Docker fixes critical 5-year old authentication bypass flaw
    The flaw was initially discovered and fixed in #DockerEngine v18.09.1, released in January 2019, but the fix wasn't carried forward, so the flaw resurfaced. This dangerous regression was identified in April 2024, and patches were eventually released today for all supported Docker Engine versions.
    Atackers had a comfortable 5-year period to leverage the flaw, it is unclear if it was ever exploited in the wild.
    bleepingcomputer.com/news/secu

  4. #AWSCloudShell now provides access to #DockerEngine for its users!

    With this integration, containers can be locally prototyped and pushed to registries before deploying them on AWS.

    Get more details on #InfoQ: bit.ly/3HKojgL

    #Docker #serverless #Containers #AWS #CloudComputing

  5. This week on my Live show key members of Docker's staff join me and Matt to talk about recent Docker Hub changes, as well as their latest release (v23) for Docker Engine and CLI. Justin Cormack, Chief Technology Officer at Docker, and Michael Irwin, Sr. Manager of DevRel at Docker, will be my guests. Thursday at 1:00 US ET (UTC-4).
    #Docker #dockerengine #DevOps
    youtube.com/watch?v=BUj-aQ7UGG

  6. RT @[email protected]

    CVE-2022-0847 (aka "Dirty Pipe") is a #Linux vulnerability that enables attackers to modify files inside host images from the container instance. Read on for how to avoid it on #DockerEngine & #DockerDesktop: dockr.ly/3CM4Lp1

    🐦🔗: twitter.com/Docker/status/1504