10 Commits

Author SHA1 Message Date
openeuler-ci-bot
5d0b0c9450 !4 rootfs: do not permit /proc mounts to non-directories
Merge pull request !4 from Vanient/master
2020-04-26 15:56:39 +08:00
xiadanni1
1029fc9d1c rootfs: do not permit /proc mounts to non-directories
mount(2) will blindly follow symlinks, which is a problem because it
allows a malicious container to trick runc into mounting /proc to an
entirely different location (and thus within the attacker's control for
a rename-exchange attack).

This is just a hotfix (to "stop the bleeding"), and the more complete
fix would be finish libpathrs and port runc to it (to avoid these types
of attacks entirely, and defend against a variety of other /proc-related
attacks). It can be bypased by someone having "/" be a volume controlled
by another container.

Fixes: CVE-2019-19921
Signed-off-by: Aleksa Sarai <asarai@suse.de>
Signed-off-by: xiadanni1 <xiadanni1@huawei.com>
2020-04-15 17:01:50 +08:00
openeuler-ci-bot
fabf83fd21 !3 runc:Pass back the pid of runc:[1:CHILD] so we can wait on it
Merge pull request !3 from Grooooot/master
2020-03-20 15:19:42 +08:00
xiadanni1
e85c7e153b runc:Pass back the pid of runc:[1:CHILD] so we can wait on it
reason:This allows the libcontainer to automatically clean up
runc:[1:CHILD] processes created as part of nsenter.

Signed-off-by: Alex Fang <littlelightlittlefire@gmail.com>
2020-03-20 21:31:32 +08:00
openeuler-ci-bot
8f8796634d !2 runc: add patches
Merge pull request !2 from Grooooot/master
2020-03-06 17:28:36 +08:00
Grooooot
ba3d1f2aa6 runc: sync patches
Signed-off-by: Grooooot <isula@huawei.com>
2020-03-05 19:34:03 +08:00
dogsheng
33edf12965 modify 2019-12-29 19:03:52 +08:00
openeuler-ci-bot
b862929a21 !1 runc: package init
Merge pull request !1 from Grooooot/master
2019-12-29 16:36:17 +08:00
openeuler-iSula
5904ba4dcf runc: package init
Signed-off-by: openeuler-iSula <isula@huawei.com>
2019-12-29 15:34:20 +08:00
openeuler-ci-bot
83e4e22447 Initial commit 2019-12-29 14:46:19 +08:00