-
Notifications
You must be signed in to change notification settings - Fork 18.8k
Add /proc/acpi to masked paths #37404
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
The deafult OCI linux spec in oci/defaults{_linux}.go in Docker/Moby from 1.11 to current upstream master does not block /proc/acpi pathnames allowing attackers to modify host's hardware like enabling/disabling bluetooth or turning up/down keyboard brightness. SELinux prevents all of this if enabled. Signed-off-by: Antonio Murdaca <runcom@redhat.com>
AppArmor does protect against this (it protects against all writes to LGTM. |
failures seems to be unrelated |
LGTM! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Codecov Report
@@ Coverage Diff @@
## master #37404 +/- ##
==========================================
+ Coverage 34.91% 34.93% +0.01%
==========================================
Files 610 610
Lines 44884 44884
==========================================
+ Hits 15672 15679 +7
+ Misses 27092 27087 -5
+ Partials 2120 2118 -2 |
Additional Information on CVE-2018-10892Since this is linked from the CVE (which I'll make sure we amend and add additional documentation because the description shows extremely small understanding of what ACPI is and can be used for, as well as the use of the procfs interface for this purpose) and people will visit this issue, a few key points:
[1] Please see the note on the kernel config option that gates all /proc/acpi population: https://github.com/torvalds/linux/blob/master/drivers/acpi/Kconfig#L100 |
Locking the conversation on this PR, as it got a bit of attention on Twitter, and I want to prevent a long discussion from hiding that summary. Feel free to discuss on Slack, the forums, or open a new ticket it more discussion is needed |
The deafult OCI linux spec in oci/defaults{_linux}.go in Docker/Moby
from 1.11 to current upstream master does not block /proc/acpi pathnames
allowing attackers to modify host's hardware like enabling/disabling
bluetooth or turning up/down keyboard brightness and probably other stuff. SELinux prevents all
of this if enabled. Probably apparmor does prevent this as well but I haven't tested.
This is reproducible with just:
We've reserved CVE-2018-10892 for this.
@thaJeztah @cyphar et all, PTAL
Signed-off-by: Antonio Murdaca runcom@redhat.com