• Nate@piefed.alphapuggle.dev
    link
    fedilink
    English
    arrow-up
    5
    ·
    15 days ago

    $10 says they haven’t actually escaped anything and it’s just hallucinating a directory structure & file contents

    • communism@lemmy.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      15 days ago

      MS said they fixed it and categorised it as a “moderate severity vulnerability” so presumably they did in fact gain root access to the container

      • wewbull@feddit.uk
        link
        fedilink
        English
        arrow-up
        2
        ·
        15 days ago

        If they gained root access to the container, that’s not a moderate vulnerability. Root inside a container is still root. You can still access the kernel with root privs and it’s the same kernel as the host.

        Docker is not a virtual machine.

        • communism@lemmy.ml
          link
          fedilink
          English
          arrow-up
          1
          ·
          15 days ago

          I know that? I’m just saying that MS categorised it as such. It would be strange to include the part about MS’s responses if MS also found that the vulnerability was not what the researchers claimed it was.

  • BaroqueInMind@piefed.social
    link
    fedilink
    English
    arrow-up
    3
    ·
    15 days ago

    And so Microsoft decided this wasn’t a big enough vulnerability to pay them a bounty. Why the fuck would you ever share that with them then, if you could sell it to a black-hat hacking org for thousands?

  • ignirtoq@fedia.io
    link
    fedilink
    arrow-up
    2
    ·
    15 days ago

    Several years ago I created a Slack bot that ran something like Jupyter notebook in a container, and it would execute Python code that you sent to it and respond with the results. It worked in channels you invited it to as well as private messages, and if you edited your message with your code, it would edit its response to always match the latest input. It was a fun exercise to learn the Slack API, as well as create something non-trivial and marginally useful in that Slack environment. I knew the horrible security implications of such a bot, even with the Python environment containerized, and never considered opening it up outside of my own personal use.

    Looks like the AI companies have decided that exact architecture is perfectly safe and secure as long as you obfuscate the input pathway by having to go through a chat-bot. Brilliant.