Does a containerized process running with a group ID of 0 present a security risk in case of a container runtime escape ?
Issue
- Let's take the scenario where someone has managed to escape the container onto the underlying host. Now that user will have a GID of 0 (appreciate UID will be non-root). Hence now we need to factor in the impact of having access to any files with GID of 0. How are we protecting against this ?
Environment
- Red Hat OpenShift Container Platform (RHOCP) 4.x
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.