Hacker News new | past | comments | ask | show | jobs | submit login

Actually, the nature of this vulnerability would prevent any attacks against docker

>> The vulnerability does not enable the execution of arbitrary code but the exploit was able to inject a JavaScript payload into the local file context. This allowed it to search for and upload potentially sensitive local files.

Moreover, since it seems you believe that javascript is a liability in this case (as much as I loathe the language: it's not!)

be aware that you still need to interpret javascript to read all of the pdfs you can find:

http://mariomalwareanalysis.blogspot.co.uk/2012/02/how-to-em...

(I also remembe reading something about opengl embedded in pdf, but I cannot find it anymore)




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: