Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

First pass on a blog post about CVE-2019-5736. #12592

Conversation

coderanger
Copy link
Member

Trying to get info out to Kubernetes users so they have some guidance.

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Feb 12, 2019
@k8s-ci-robot k8s-ci-robot added size/M Denotes a PR that changes 30-99 lines, ignoring generated files. language/en Issues or PRs related to English language labels Feb 12, 2019
@netlify
Copy link

netlify bot commented Feb 12, 2019

Deploy preview for kubernetes-io-master-staging ready!

Built with commit cbb745c

https://deploy-preview-12592--kubernetes-io-master-staging.netlify.com

@kbarnard10 kbarnard10 self-assigned this Feb 12, 2019
Copy link
Member

@zparnold zparnold left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Take a look at my suggestion, I could be off base but just let me know 😄

@zparnold zparnold self-assigned this Feb 12, 2019
@kbarnard10
Copy link
Contributor

/lgtm
/approve

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 12, 2019
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: kbarnard10

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Feb 12, 2019
@k8s-ci-robot k8s-ci-robot merged commit 2bda45d into kubernetes:master Feb 12, 2019
@coderanger coderanger deleted the coderanger/runc-cve-2019-5736-blog-post branch February 12, 2019 05:40

While full details are still embargoed to give people time to patch, the rough version is that when running a process as root (UID 0) inside a container, that process can exploit a bug in runc to gain root privileges on the host running the container. This then allows them unlimited access to the server as well as any other containers on that server.

If the process inside the container is either trusted (something you know is not hostile) or is not running as UID 0, then the vulnerability does not apply. It can also be prevented by SELinux, if an appropriate policy has been applied. RedHat Enterprise Linux, CentOS, and Fedora all include appropriate SELinux permissions with their packages and so are believed to be unaffected.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The official announcement explicitly calls out that the default Fedora policy is still vulnerable. Any reason to think otherwise?


#### Google Container Engine (GKE)

Google has issued a [security bulletin](https://cloud.google.com/kubernetes-engine/docs/security-bulletins#february-11-2019-runc) with more detailed information but in short, if you are using the default GKE node image then you are safe. If you are using an Ubuntu or CoreOS node image then you will need to mitigate or upgrade to an image with a fixed version of runc.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Note that GKE does not support running with CoreOS images.

@tallclair
Copy link
Member

@coderanger Thanks for the right up. Would you mind correcting the details I commented on?

kwiesmueller pushed a commit to kwiesmueller/website that referenced this pull request Feb 28, 2019
* First pass on a blog post about CVE-2019-5736.

* Clarify that k8s is not the problem.

* Fix example of pinning to an image hash.

My mistake deftly caught by @zparnold.

Co-Authored-By: coderanger <[email protected]>

* Add links to the rest of the notices or releases.

* Add ways to get more info.

* RHEL link for those that don't selinux.

* Link to Rancher's back ports.
krmayankk pushed a commit to krmayankk/kubernetes.github.io that referenced this pull request Mar 11, 2019
* First pass on a blog post about CVE-2019-5736.

* Clarify that k8s is not the problem.

* Fix example of pinning to an image hash.

My mistake deftly caught by @zparnold.

Co-Authored-By: coderanger <[email protected]>

* Add links to the rest of the notices or releases.

* Add ways to get more info.

* RHEL link for those that don't selinux.

* Link to Rancher's back ports.
yagonobre pushed a commit to yagonobre/website that referenced this pull request Mar 14, 2019
* First pass on a blog post about CVE-2019-5736.

* Clarify that k8s is not the problem.

* Fix example of pinning to an image hash.

My mistake deftly caught by @zparnold.

Co-Authored-By: coderanger <[email protected]>

* Add links to the rest of the notices or releases.

* Add ways to get more info.

* RHEL link for those that don't selinux.

* Link to Rancher's back ports.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. language/en Issues or PRs related to English language lgtm "Looks good to me", indicates that a PR is ready to be merged. size/M Denotes a PR that changes 30-99 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants