-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add SCMP_ACT_LOG as a valid Seccomp action #1951
Conversation
REF moby/moby#38333 |
190c60b
to
1039b14
Compare
This is failing because it requires seccomp/libseccomp-golang#29 to be merged 😢 |
673434d
to
0ca09a8
Compare
😁 🎉 |
@justincormack PTAL |
@justincormack do you need me to do anything else? |
ping @justincormack |
1 similar comment
ping @justincormack |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
found one unrelated change; could you also squash your commits?
Dockerfile
Outdated
@@ -67,4 +67,4 @@ ENTRYPOINT ["/tmpmount"] | |||
ADD . /go/src/github.com/opencontainers/runc | |||
|
|||
RUN . tests/integration/multi-arch.bash \ | |||
&& curl -o- -sSL `get_busybox` | tar xfJC - ${ROOTFS} | |||
&& curl -o- -sSL `get_busybox` | tar xfJC - ${ROOTFS} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks like this inadvertently removed a newline
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I have removed them and learned more about git squashing ;)
fab554d
to
0c82a88
Compare
Signed-off-by: blacktop <blacktop@users.noreply.github.com>
Thanks for squashing 👍
Perhaps you can change to your real name? (see contributing.md;
Changes themselves SGTM, but I'll try to get @justincormack and/or @crosbymichael to have a look |
@crosbymichael @thaJeztah @justincormack is there anything else left before we can merge this? |
@crosbymichael @thaJeztah @justincormack I have rebased so we should be good to go now? |
Looks like there's a merge-commit in your branch; did you do a rebase, or a merge? |
1 similar comment
We did it!!!! 👍 😎 👍 |
full diff: opencontainers/runc@3e425f8...v1.0.0-rc9 - opencontainers/runc#1951 Add SCMP_ACT_LOG as a valid Seccomp action - opencontainers/runc#2130 *: verify operations on /proc/... are on procfs This is an additional mitigation for CVE-2019-16884. The primary problem is that Docker can be coerced into bind-mounting a file system on top of /proc (resulting in label-related writes to /proc no longer happening). While we are working on mitigations against permitting the mounts, this helps avoid our code from being tricked into writing to non-procfs files. This is not a perfect solution (after all, there might be a bind-mount of a different procfs file over the target) but in order to exploit that you would need to be able to tweak a config.json pretty specifically (which thankfully Docker doesn't allow). Specifically this stops AppArmor from not labeling a process silently due to /proc/self/attr/... being incorrectly set, and stops any accidental fd leaks because /proc/self/fd/... is not real. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Signed-off-by: blacktop <blacktop@users.noreply.github.com>
full diff: opencontainers/runc@3e425f8...v1.0.0-rc9 - opencontainers/runc#1951 Add SCMP_ACT_LOG as a valid Seccomp action - opencontainers/runc#2130 *: verify operations on /proc/... are on procfs This is an additional mitigation for CVE-2019-16884. The primary problem is that Docker can be coerced into bind-mounting a file system on top of /proc (resulting in label-related writes to /proc no longer happening). While we are working on mitigations against permitting the mounts, this helps avoid our code from being tricked into writing to non-procfs files. This is not a perfect solution (after all, there might be a bind-mount of a different procfs file over the target) but in order to exploit that you would need to be able to tweak a config.json pretty specifically (which thankfully Docker doesn't allow). Specifically this stops AppArmor from not labeling a process silently due to /proc/self/attr/... being incorrectly set, and stops any accidental fd leaks because /proc/self/fd/... is not real. Signed-off-by: Sebastiaan van Stijn <github@gone.nl> Upstream-commit: efcd84e47c6bc3f5e52eb2cce518f55501d60ce7 Component: engine
Signed-off-by: blacktop <blacktop@users.noreply.github.com>
This enables logging of all system calls in a container. This could be useful for creating minimal seccomp profiles, and is the only Seccomp action runc doesn't support at present.