17 Commits

Author SHA1 Message Date
xiadanni
450a0907cf runc: fix permission denied
reason: when exec as root and config.Cwd is not owned by root,
exec will fail because root doesn't have the caps.

Signed-off-by: Kurnia D Win <kurnia.d.win@gmail.com>
Signed-off-by: xiadanni <xiadanni1@huawei.com>
2020-07-09 16:02:37 +08:00
openeuler-ci-bot
e532736168 !7 runc: add yaml file in package
Merge pull request !7 from Vanient/master
2020-07-07 14:16:08 +08:00
xiadanni
5a188f2c87 runc: add yaml file in package
Signed-off-by: xiadanni <xiadanni1@huawei.com>
2020-07-06 10:21:54 +08:00
openeuler-ci-bot
2c74c3d91e !6 runc: use git-commit to store commit ID
Merge pull request !6 from Vanient/master
2020-06-15 15:45:49 +08:00
xiadanni1
ab5af31922 runc: use git-commit to store commit ID
Change-Id: Ib43bafb0ec680082520d85530ef783b68bc08671
Signed-off-by: xiadanni1 <xiadanni1@huawei.com>
2020-06-12 01:19:00 +08:00
openeuler-ci-bot
438be5f0d9 !5 add runc-openeuler.yaml
Merge pull request !5 from 成子晗/master
2020-05-09 19:23:32 +08:00
chengzihan2
79b5a220be add runc-openeuler.yaml 2020-05-06 16:36:00 +08:00
openeuler-ci-bot
5d0b0c9450 !4 rootfs: do not permit /proc mounts to non-directories
Merge pull request !4 from Vanient/master
2020-04-26 15:56:39 +08:00
xiadanni1
1029fc9d1c rootfs: do not permit /proc mounts to non-directories
mount(2) will blindly follow symlinks, which is a problem because it
allows a malicious container to trick runc into mounting /proc to an
entirely different location (and thus within the attacker's control for
a rename-exchange attack).

This is just a hotfix (to "stop the bleeding"), and the more complete
fix would be finish libpathrs and port runc to it (to avoid these types
of attacks entirely, and defend against a variety of other /proc-related
attacks). It can be bypased by someone having "/" be a volume controlled
by another container.

Fixes: CVE-2019-19921
Signed-off-by: Aleksa Sarai <asarai@suse.de>
Signed-off-by: xiadanni1 <xiadanni1@huawei.com>
2020-04-15 17:01:50 +08:00
openeuler-ci-bot
fabf83fd21 !3 runc:Pass back the pid of runc:[1:CHILD] so we can wait on it
Merge pull request !3 from Grooooot/master
2020-03-20 15:19:42 +08:00
xiadanni1
e85c7e153b runc:Pass back the pid of runc:[1:CHILD] so we can wait on it
reason:This allows the libcontainer to automatically clean up
runc:[1:CHILD] processes created as part of nsenter.

Signed-off-by: Alex Fang <littlelightlittlefire@gmail.com>
2020-03-20 21:31:32 +08:00
openeuler-ci-bot
8f8796634d !2 runc: add patches
Merge pull request !2 from Grooooot/master
2020-03-06 17:28:36 +08:00
Grooooot
ba3d1f2aa6 runc: sync patches
Signed-off-by: Grooooot <isula@huawei.com>
2020-03-05 19:34:03 +08:00
dogsheng
33edf12965 modify 2019-12-29 19:03:52 +08:00
openeuler-ci-bot
b862929a21 !1 runc: package init
Merge pull request !1 from Grooooot/master
2019-12-29 16:36:17 +08:00
openeuler-iSula
5904ba4dcf runc: package init
Signed-off-by: openeuler-iSula <isula@huawei.com>
2019-12-29 15:34:20 +08:00
openeuler-ci-bot
83e4e22447 Initial commit 2019-12-29 14:46:19 +08:00