Overview

Request 861676 accepted

- Update to 1.11.5:
runtime: Security fixes included:
- Readonly bind-mounts are now mounted read-only on the host.
With this fix, mounts are protected at VM boundary not just
the guest kernel. If a container escape were to occur, one
would be able to write to a directory or file that was
mounted read-only.
- Certain annotations in kata can be used to execute
pre-exiting binaries. This could be used to execute arbitrary
binaries with the onus of validating these paths left to the
stack about Kata. In this release, we added appropriate
validations so that an admin can configure a list of file
system paths that can be used to filter annotations that
represent valid file names.

Request History
Richard Brown's avatar

RBrownSUSE created request

- Update to 1.11.5:
runtime: Security fixes included:
- Readonly bind-mounts are now mounted read-only on the host.
With this fix, mounts are protected at VM boundary not just
the guest kernel. If a container escape were to occur, one
would be able to write to a directory or file that was
mounted read-only.
- Certain annotations in kata can be used to execute
pre-exiting binaries. This could be used to execute arbitrary
binaries with the onus of validating these paths left to the
stack about Kata. In this release, we added appropriate
validations so that an admin can configure a list of file
system paths that can be used to filter annotations that
represent valid file names.


Richard Brown's avatar

RBrownSUSE accepted request

openSUSE Build Service is sponsored by