chore(deps): update module github.com/containerd/containerd to v1.7.11 [security] #21067
+4
−4
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v1.7.10
->v1.7.11
GitHub Vulnerability Alerts
GHSA-7ww5-4wqc-m92c
/sys/devices/virtual/powercap accessible by default to containers
Intel's RAPL (Running Average Power Limit) feature, introduced by the Sandy Bridge microarchitecture, provides software insights into hardware energy consumption. To facilitate this, Intel introduced the powercap framework in Linux kernel 3.13, which reads values via relevant MSRs (model specific registers) and provides unprivileged userspace access via
sysfs
. As RAPL is an interface to access a hardware feature, it is only available when running on bare metal with the module compiled into the kernel.By 2019, it was realized that in some cases unprivileged access to RAPL readings could be exploited as a power-based side-channel against security features including AES-NI (potentially inside a SGX enclave) and KASLR (kernel address space layout randomization). Also known as the PLATYPUS attack, Intel assigned CVE-2020-8694 and CVE-2020-8695, and AMD assigned CVE-2020-12912.
Several mitigations were applied; Intel reduced the sampling resolution via a microcode update, and the Linux kernel prevents access by non-root users since 5.10. However, this kernel-based mitigation does not apply to many container-based scenarios:
sysfs
is mounted inside containers read-only; however only read access is needed to carry out this attack on an unpatched CPUWhile this is not a direct vulnerability in container runtimes, defense in depth and safe defaults are valuable and preferred, especially as this poses a risk to multi-tenant container environments. This is provided by masking
/sys/devices/virtual/powercap
in the default mount configuration, and adding an additional set of rules to deny it in the default AppArmor profile.While
sysfs
is not the only way to read from the RAPL subsystem, other ways of accessing it require additional capabilities such asCAP_SYS_RAWIO
which is not available to containers by default, orperf
paranoia level less than 1, which is a non-default kernel tunable.References
Release Notes
containerd/containerd (github.com/containerd/containerd)
v1.7.11
: containerd 1.7.11Compare Source
Welcome to the v1.7.11 release of containerd!
The eleventh patch release for containerd 1.7 contains various fixes and updates including
one security issue.
Notable Updates
/sys/devices/virtual/powercap
path in runtime spec and deny in default apparmor profile (GHSA-7ww5-4wqc-m92c)Deprecation Warnings
See the changelog for complete list of changes
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
39 commits
dfae68bc3
Prepare release notes for v1.7.110d314401d
update to go1.20.12, test go1.21.51ec1ae2c6
update to go1.20.11, test go1.21.4cb804da21
contrib/apparmor: deny /sys/devices/virtual/powercap40162a576
oci/spec: deny /sys/devices/virtual/powercaped7c6895b
Don't block snapshot garbage collection on Remove failures1fdefdd22
Add warning for CRIU config usagef8f659e66
Add HTTP client update function to tracing library807ddd658
fix(tracing): use latest version of semconvdc45bc838
Add cri-api v1alpha2 usage warning to all api calls9d1bad62e
deprecation: fix missing spaces in warnings51a604c07
cri: add deprecation warning for runtime_root8040e74bf
cri: add deprecation warning for rutnime_engine99adc40eb
cri: add deprecation warning for default_runtimeafef7ec64
cri: add warning for untrusted_workload_runtime6220dc190
cri: add warning for old form of systemd_cgroup80f96cd18
runtime/v2: net.Dial gRPC shim sockets before trying grpcf471bb2b8
tasks: emit warning for runc v1 runtime329e1d487
tasks: emit warning for v1 runtime4464fde12
push: always inherit distribution sources from parent7e069ee25
Update tar tests to run on Darwin5fc0e4e61
ctr: Add sandbox flag to ctr run31fe03764
Fix windows default path overwrite issue625b35e4b
snapshots: emit deprecation warning for aufsDependency Changes
Previous release can be found at v1.7.10
Configuration
📅 Schedule: Branch creation - "" in timezone UTC, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Never, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.