Monday, 2018-05-28

*** dlw has quit IRC00:10
*** psuriset_ has quit IRC01:58
*** dlw has joined #kata-dev02:07
*** psuriset_ has joined #kata-dev03:22
*** dlw has quit IRC05:42
*** dlw has joined #kata-dev05:43
*** dlw1 has joined #kata-dev06:42
*** dlw has quit IRC06:43
*** dlw1 is now known as dlw06:43
*** dlw has quit IRC07:04
*** sameo has joined #kata-dev07:29
*** changcheng has quit IRC07:51
*** changcheng has joined #kata-dev07:51
*** psuriset_ has quit IRC08:46
*** fdegir_ has joined #kata-dev09:53
*** fdegir has quit IRC10:01
*** fdegir_ is now known as fdegir10:01
*** psuriset_ has joined #kata-dev10:05
*** fuentess has joined #kata-dev12:35
*** devimc has joined #kata-dev12:55
*** dlw has joined #kata-dev13:58
*** psuriset_ has quit IRC14:15
*** psuriset has joined #kata-dev14:33
*** sameo has quit IRC14:47
*** dlw has quit IRC14:53
*** devimc has quit IRC15:17
*** devimc has joined #kata-dev15:17
*** sameo has joined #kata-dev16:16
*** devimc_ has joined #kata-dev17:58
*** devimc has quit IRC17:58
*** devimc_ has quit IRC18:21
*** devimc has joined #kata-dev18:23
*** psuriset has quit IRC19:19
*** KOLANICH has joined #kata-dev21:03
KOLANICHHi everyone. How can Kata Containers protect from a vuln like Dirty Cow? I mean if it proxies syscalls and an OS has a vuln which an be exploiting by manipulation with syscalls what prevents an adversary from using proxied syscalls vor this?21:07
KOLANICH*for21:07
devimcKOLANICH, I'm not an expert in that topic, but I think this can answer your question21:21
devimchttps://clearlinux.org/blogs/how-intel-clear-containers-protects-against-root-kernel-exploits-dirty-cow21:21
KOLANICHdevimc: thank you for the link, but it doesn't answer my question and looks mre like a marketing material than a technical article.21:30
*** KOLANICH has quit IRC21:30
devimclol21:30
*** fuentess has quit IRC21:36
*** sameo has quit IRC22:39
*** devimc has quit IRC22:51

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!