dbbf08849b
Fixes the following security vulnerability: - CVE-2019-16884: runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory. Signed-off-by: Christian Stewart <christian@paral.in> [Peter: mention security impact] Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
24 lines
569 B
Makefile
24 lines
569 B
Makefile
################################################################################
|
|
#
|
|
# runc
|
|
#
|
|
################################################################################
|
|
|
|
RUNC_VERSION = 1.0.0-rc9
|
|
RUNC_SITE = $(call github,opencontainers,runc,v$(RUNC_VERSION))
|
|
RUNC_LICENSE = Apache-2.0
|
|
RUNC_LICENSE_FILES = LICENSE
|
|
|
|
RUNC_WORKSPACE = Godeps/_workspace
|
|
|
|
RUNC_LDFLAGS = -X main.gitCommit=$(RUNC_VERSION)
|
|
|
|
RUNC_TAGS = cgo static_build
|
|
|
|
ifeq ($(BR2_PACKAGE_LIBSECCOMP),y)
|
|
RUNC_TAGS += seccomp
|
|
RUNC_DEPENDENCIES += libseccomp host-pkgconf
|
|
endif
|
|
|
|
$(eval $(golang-package))
|