-
Notifications
You must be signed in to change notification settings - Fork 591
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
interfaces/docker-support: add exec "/bin/runc" #7090
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM but needs an ACK from jdstrand too.
@tianon it looks like the CLA failed, can you repush with an email that has signed the CLA or sign the CLA with your new email? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Welp, I signed the CLA and rebased/force pushed to force a recheck but it still comes back rejected. 😕 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+1, I'll monitor the CLA situation.
Newer runC applied further improvements to their CVE-2019-5736 mitigation in opencontainers/runc#1984 which change the nature of our apparmor denial from `/` to `/bin/runc` (which I have also commented on https://bugs.launchpad.net/apparmor/+bug/1820344 about). See also canonical#6610. Signed-off-by: Tianon Gravi <tianon@debian.org>
As a hail mary I rebased and force pushed again to trigger the CLA check again (hoping perhaps something just needed to propagate) and still no dice. 😕 |
@tianon in the interest of time, are you okay if I open a new PR with your change committed from me? |
Absolutely! |
#7106 is the new PR. Closing this one. |
Newer runC applied further improvements to their CVE-2019-5736 mitigation in opencontainers/runc#1984 which change the nature of our apparmor denial from
/
to/bin/runc
(which I have also commented on https://bugs.launchpad.net/apparmor/+bug/1820344 about).See also #6610.
cc @anonymouse64