Go to file
Christian Stewart cd140f26cc package/containerd: security bump to version 1.5.9
CVE-2021-43816: "Unprivileged pod using `hostPath` can side-step active LSM when
it is SELinux"

Containers launched through containerd’s CRI implementation on Linux systems
which use the SELinux security module and containerd versions since v1.5.0 can
cause arbitrary files and directories on the host to be relabeled to match the
container process label through the use of specially-configured bind mounts in a
hostPath volume. This relabeling elevates permissions for the container,
granting full read/write access over the affected files and directories.
Kubernetes and crictl can both be configured to use containerd’s CRI
implementation.

https://github.com/advisories/GHSA-mvff-h3cj-wj9c
https://github.com/containerd/containerd/releases/tag/v1.5.9

Signed-off-by: Christian Stewart <christian@paral.in>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit 935bd589a3)
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2022-01-28 22:06:46 +01:00
arch arch/config: Make RISC-V 64-bits MMU optional 2021-10-27 14:39:01 +02:00
board board/orangepi/orangepi-rk3399/extlinux.conf: fix label name 2022-01-28 22:03:30 +01:00
boot boot/grub2/Config.in: add symbols to represent legacy and EFI boot 2021-12-04 18:04:08 +01:00
configs configs/imx6ullevk: select BR2_TARGET_UBOOT_NEEDS_OPENSSL 2022-01-25 18:04:15 +01:00
docs Update for 2021.11 2021-12-05 20:59:16 +01:00
fs fs/ext2: fir (again) namespace for variables 2021-10-13 18:01:34 +02:00
linux {linux, linux-headers}: bump 4.{4, 9, 14, 19}.x / 5.{4, 10, 15}.x series 2022-01-28 11:25:27 +01:00
package package/containerd: security bump to version 1.5.9 2022-01-28 22:06:46 +01:00
support support/scripts/pkg-stats: fix flake8 errors 2022-01-27 17:50:38 +01:00
system system: support br2-external init systems 2020-10-14 22:48:42 +02:00
toolchain package/toolchain: rename GLIBC_COPY_NSSWITCH_FILE 2021-11-25 20:53:43 +01:00
utils utils/getdeveloperlib.py: fix developer being reported for unrelated path 2022-01-14 17:35:20 +01:00
.defconfig arch: remove support for sh64 2016-09-08 22:15:15 +02:00
.flake8 Revert ".flake8: fix check for 80/132 columns" 2021-01-02 17:38:20 +01:00
.gitignore
.gitlab-ci.yml .gitlab-ci.yml: use the Docker image from gitlab registry 2021-10-24 16:12:43 +02:00
CHANGES Update for 2021.11 2021-12-05 20:59:16 +01:00
Config.in Config.in: disable Fortify Source for microblaze 2021-08-23 23:08:05 +02:00
Config.in.legacy package/mpd: drop tidal option 2021-11-09 23:04:45 +01:00
COPYING
DEVELOPERS DEVELOPERS: drop Henrique Camargo 2022-01-27 19:31:23 +01:00
Makefile Makefile: set HOST*_NOCCACHE variables only if unset 2022-01-25 22:07:28 +01:00
Makefile.legacy Remove BR2_DEPRECATED 2016-10-15 23:14:45 +02:00
README docs: move the IRC channel away from Freenode 2021-05-29 22:16:23 +02:00

Buildroot is a simple, efficient and easy-to-use tool to generate embedded
Linux systems through cross-compilation.

The documentation can be found in docs/manual. You can generate a text
document with 'make manual-text' and read output/docs/manual/manual.text.
Online documentation can be found at http://buildroot.org/docs.html

To build and use the buildroot stuff, do the following:

1) run 'make menuconfig'
2) select the target architecture and the packages you wish to compile
3) run 'make'
4) wait while it compiles
5) find the kernel, bootloader, root filesystem, etc. in output/images

You do not need to be root to build or run buildroot.  Have fun!

Buildroot comes with a basic configuration for a number of boards. Run
'make list-defconfigs' to view the list of provided configurations.

Please feed suggestions, bug reports, insults, and bribes back to the
buildroot mailing list: buildroot@buildroot.org
You can also find us on #buildroot on OFTC IRC.

If you would like to contribute patches, please read
https://buildroot.org/manual.html#submitting-patches