Timeline for Host filesystem manipulation from docker vs. virtual machine
Current License: CC BY-SA 4.0
2 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Aug 13, 2020 at 14:49 | comment | added | AlexV | "In that configuration, if a sensitive host path is mapped inside the container, it would be easy for an attacker who has gained access to the container to modify the files on the host." Yeah, that's true. The example given in the question works perfectly fine from a Docker container. | |
| Aug 13, 2020 at 14:18 | history | answered | Rory McCune | CC BY-SA 4.0 |