File tree 2 files changed +30
-3
lines changed
2 files changed +30
-3
lines changed Original file line number Diff line number Diff line change 32
32
"ecosystem_specific" : {
33
33
"imports" : [
34
34
{
35
- "path" : " github.com/opencontainers/runc/libcontainer"
35
+ "path" : " github.com/opencontainers/runc/libcontainer/apparmor" ,
36
+ "symbols" : [
37
+ " ApplyProfile"
38
+ ]
39
+ },
40
+ {
41
+ "path" : " github.com/opencontainers/runc/libcontainer/utils" ,
42
+ "symbols" : [
43
+ " CloseExecFrom"
44
+ ]
36
45
}
37
46
]
38
47
}
61
70
"ecosystem_specific" : {
62
71
"imports" : [
63
72
{
64
- "path" : " github.com/opencontainers/selinux/go-selinux"
73
+ "path" : " github.com/opencontainers/selinux/go-selinux" ,
74
+ "symbols" : [
75
+ " readCon" ,
76
+ " writeCon"
77
+ ]
65
78
}
66
79
]
67
80
}
76
89
"type" : " FIX" ,
77
90
"url" : " https://github.com/opencontainers/runc/commit/cad42f6e0932db0ce08c3a3d9e89e6063ec283e4"
78
91
},
92
+ {
93
+ "type" : " FIX" ,
94
+ "url" : " https://github.com/opencontainers/selinux/commit/03b517dc4fd57245b1cf506e8ba7b817b6d309da"
95
+ },
79
96
{
80
97
"type" : " WEB" ,
81
98
"url" : " https://github.com/opencontainers/runc/issues/2128"
Original file line number Diff line number Diff line change @@ -2,13 +2,22 @@ modules:
2
2
- module : github.com/opencontainers/runc
3
3
versions :
4
4
- fixed : 1.0.0-rc8.0.20190930145003-cad42f6e0932
5
+ vulnerable_at : 1.0.0-rc8
5
6
packages :
6
- - package : github.com/opencontainers/runc/libcontainer
7
+ - package : github.com/opencontainers/runc/libcontainer/apparmor
8
+ symbols :
9
+ - ApplyProfile
10
+ - package : github.com/opencontainers/runc/libcontainer/utils
11
+ symbols :
12
+ - CloseExecFrom
7
13
- module : github.com/opencontainers/selinux
8
14
versions :
9
15
- fixed : 1.3.1-0.20190929122143-5215b1806f52
10
16
packages :
11
17
- package : github.com/opencontainers/selinux/go-selinux
18
+ symbols :
19
+ - readCon
20
+ - writeCon
12
21
description : |
13
22
AppArmor restrictions may be bypassed due to improper validation of mount
14
23
targets, allowing a malicious image to mount volumes over e.g. /proc.
@@ -21,4 +30,5 @@ credit: Leopold Schabel
21
30
references :
22
31
- fix : https://github.com/opencontainers/runc/pull/2130
23
32
- fix : https://github.com/opencontainers/runc/commit/cad42f6e0932db0ce08c3a3d9e89e6063ec283e4
33
+ - fix : https://github.com/opencontainers/selinux/commit/03b517dc4fd57245b1cf506e8ba7b817b6d309da
24
34
- web : https://github.com/opencontainers/runc/issues/2128
You can’t perform that action at this time.
0 commit comments