Files
Matthew Heon 69daa67c43 Correct handling of capabilities
Ensure that capabilities are properly handled for non-root users
in privileged containers. We do not want to give full caps, but
instead only CapInh and CapEff (others should be all-zeroes).

Fixing `podman run` is easy - the same code as the Podman 1.6 fix
works there. The `podman exec` command is far more challenging.
Exec received a complete rewrite to use Conmon at some point
before Podman 1.6, and gained many capabilities in the process.
One of those was the ability to actually tweak the capabilities
of the exec process - 1.0 did not have that. Since it was needed
to resolve this CVE, I was forced to backport a large bit of the
1.0 -> 1.6 exec changes (passing a Process block to the OCI
runtime, and using `prepareProcessExec()` to prepare said block).
I am honestly uncomfortable with the size and scope of this
change but I don't see another way around this.

Fixes CVE-2021-20188

Signed-off-by: Matthew Heon <mheon@redhat.com>
2021-01-25 14:18:07 -05:00
..
2018-08-16 17:12:36 +00:00
2017-11-01 11:24:59 -04:00
2018-12-06 10:17:16 +00:00
2018-12-06 10:17:16 +00:00
2018-12-19 14:20:55 -06:00
2021-01-25 14:18:07 -05:00
2018-12-07 10:27:41 -06:00
2018-08-23 15:01:17 +00:00
2018-08-23 15:01:17 +00:00
2018-08-23 18:16:28 +00:00
2018-12-06 10:17:16 +00:00
2018-12-06 10:17:16 +00:00
2018-10-03 12:45:37 -05:00
2018-12-06 23:31:54 +01:00
2018-03-14 20:21:31 +00:00
2018-12-06 23:31:54 +01:00
2018-10-31 00:27:08 +01:00
2018-12-06 10:17:16 +00:00