-
Notifications
You must be signed in to change notification settings - Fork 594
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
interfaces/builtin: add add exec "/" to docker-support #6610
interfaces/builtin: add add exec "/" to docker-support #6610
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This weird access has to do with memfd sealing. There is a kernel issue where the path is not visible to AppArmor and (we believe) because we're using attach_disconnected, it gets mapped to /. The same access was needed for greengrass. For now this is fine to add, but can you create a bug against the apparmor project and reference LP: #... here?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+1, agree with jdstrand about the bug report.
@jdstrand is there a kernel bug tracking this? Should we file one?
With @anonymouse64 filing a bug against apparmor, that is enough for jj to look into and escalate if it is a larger kernel/LSM issue as needed (it might be apparmor-specific, don't know yet). |
This access is needed to allow recent versions of runC inside docker 18.06.3 and 18.09.3 to run properly. Note that the snap is not affected by CVE-2019-5736 directly, but this access is needed so that the mitigation works properly. Signed-off-by: Ian Johnson <[email protected]>
42f60f9
to
616333e
Compare
I filed apparmor bug https://bugs.launchpad.net/apparmor/+bug/1820344 for this |
Co-Authored-By: anonymouse64 <[email protected]>
Codecov Report
@@ Coverage Diff @@
## master #6610 +/- ##
==========================================
+ Coverage 79.16% 79.22% +0.05%
==========================================
Files 592 592
Lines 45461 45464 +3
==========================================
+ Hits 35991 36017 +26
+ Misses 6559 6532 -27
- Partials 2911 2915 +4
Continue to review full report at Codecov.
|
Newer runC applied further improvements to their CVE-2019-5736 mitigation in opencontainers/runc#1984 which change the nature of our apparmor denial from `/` to `/bin/runc` (which I have also commented on https://bugs.launchpad.net/apparmor/+bug/1820344 about). See also canonical#6610. Signed-off-by: Tianon Gravi <[email protected]>
Newer runC applied further improvements to their CVE-2019-5736 mitigation in opencontainers/runc#1984 which change the nature of our apparmor denial from `/` to `/bin/runc` (which I have also commented on https://bugs.launchpad.net/apparmor/+bug/1820344 about). See also canonical#6610. Signed-off-by: Tianon Gravi <[email protected]>
Newer runC applied further improvements to their CVE-2019-5736 mitigation in opencontainers/runc#1984 which change the nature of our apparmor denial from `/` to `/bin/runc` (which I have also commented on https://bugs.launchpad.net/apparmor/+bug/1820344 about). See also canonical#6610. Signed-off-by: Tianon Gravi <[email protected]>
Newer runC applied further improvements to their CVE-2019-5736 mitigation in opencontainers/runc#1984 which change the nature of our apparmor denial from `/` to `/bin/runc` (which I have also commented on https://bugs.launchpad.net/apparmor/+bug/1820344 about). See also canonical#6610. (originally from Tianon Gravi, but re-committed due to CLA issues with the PR checks) Signed-off-by: Ian Johnson <[email protected]>
Newer runC applied further improvements to their CVE-2019-5736 mitigation in opencontainers/runc#1984 which change the nature of our apparmor denial from `/` to `/bin/runc` (which I have also commented on https://bugs.launchpad.net/apparmor/+bug/1820344 about). See also #6610. (originally from Tianon Gravi, but re-committed due to CLA issues with the PR checks) Signed-off-by: Ian Johnson <[email protected]>
This access is needed to allow recent versions of runC inside docker
18.06.3 and 18.09.3 to run properly. Note that the snap is not affected
by CVE-2019-5736 directly, but this access is needed so that the
mitigation works properly.