The flaws let attackers abuse masked paths, console bind-mounts, and redirected writes to escape containers and gain host privileges.
Containers are a hot topic. The technology, which has been most typified by Docker, enables applications to be deployed as a lightweight set of processes rather than an entire virtual machine (VM).