-
Notifications
You must be signed in to change notification settings - Fork 262
Comparing changes
Open a pull request
base repository: containers/storage
base: v1.51.1
head repository: containers/storage
compare: v1.51.2
- 8 commits
- 5 files changed
- 3 contributors
Commits on Jul 11, 2024
-
Merge pull request #1990 from TomSweeneyRedHat/dev/tsweeney/acel244-1.51
[release-1.51] Backport ignore chown errors in additionalimagestore
Configuration menu - View commit details
-
Copy full SHA for d270930 - Browse repository at this point
Copy the full SHA d270930View commit details
Commits on Oct 23, 2024
-
userns: fix off-by-one userns max size detection
fix the detection for the maximum userns size from an image. If the maximum ID used in an image is X, we need to use a user namespace with size X+1 to include UID=X. Closes: #2104 Signed-off-by: Giuseppe Scrivano <gscrivan@redhat.com>
Configuration menu - View commit details
-
Copy full SHA for bfb1a6d - Browse repository at this point
Copy the full SHA bfb1a6dView commit details -
users: fix path for /etc/group in the container
Signed-off-by: Giuseppe Scrivano <gscrivan@redhat.com>
Configuration menu - View commit details
-
Copy full SHA for f4f1e4f - Browse repository at this point
Copy the full SHA f4f1e4fView commit details -
the alpine image defines a "nogroup": $ podman run --rm alpine grep nogroup /etc/group nogroup:x:65533: ignore it as we are already doing for the "nobody" user. Signed-off-by: Giuseppe Scrivano <gscrivan@redhat.com>
Configuration menu - View commit details
-
Copy full SHA for b4407e3 - Browse repository at this point
Copy the full SHA b4407e3View commit details -
Use securejoin.SecureJoin when forming userns paths
We need to read /etc/passwd and /etc/group in the container to get an idea of how many UIDs and GIDs we need to allocate for a user namespace when `--userns=auto` is specified. We were forming paths for these using filepath.Join, which is not safe for paths within a container, resulting in this CVE allowing crafted symlinks in the container to access paths on the host instead. Cherry-pick conflict fixed for v1.51 branch, and converted to use the old securejoin API (securejoin.SecureJoin and then os.Open) as this branch is too old to have the new API. Addresses CVE-2024-9676 Signed-off-by: Matt Heon <mheon@redhat.com>
Configuration menu - View commit details
-
Copy full SHA for 0dc4fc9 - Browse repository at this point
Copy the full SHA 0dc4fc9View commit details -
Use golang:1.19 for lint, instead of latest
Signed-off-by: Matt Heon <mheon@redhat.com>
Configuration menu - View commit details
-
Copy full SHA for 2ebd9bb - Browse repository at this point
Copy the full SHA 2ebd9bbView commit details -
Merge pull request #2146 from mheon/backport_2024_9676_release151
[release-1.51] Backport CVE-2024-9676 fix
Configuration menu - View commit details
-
Copy full SHA for e7a5bf7 - Browse repository at this point
Copy the full SHA e7a5bf7View commit details -
[release-1.51] Bump version to v1.51.2
As the title says. Bumping the version to fix CVE-2024-9676 in this branch. Signed-off-by: tomsweeneyredhat <tsweeney@redhat.com>
Configuration menu - View commit details
-
Copy full SHA for c7649e8 - Browse repository at this point
Copy the full SHA c7649e8View commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff v1.51.1...v1.51.2