16 Commits

Author SHA1 Message Date
chenjiankun
65e2e6f6a5 fix CVE-2021-41089
fix #I5CA8X

(cherry picked from commit 57f2f606bf67d58e1993e0353244a5f6b60cb598)
2022-06-28 19:30:18 +08:00
chenjiankun
f8ffee8d73 close channel in write side to avoid panic in docker stats
fix #I5ATMV

(cherry picked from commit e30932844aeb7d94b6ec1491e63acb0d1a9a2b1a)
2022-06-28 19:30:18 +08:00
chenjiankun
95a9037aa0 fix status inconsistent after restart container
fix #I5AIPF
fix #I5AD5N

(cherry picked from commit e72fc4bf764a9bca988612213a205c9534ca3c6f)
2022-06-28 19:30:18 +08:00
chenjiankun
cf8962ea99 docker: sync from sp1
(cherry picked from commit 660a50e8357f7dae94ab3cda8f42dda3bddf134b)
2022-06-28 15:54:39 +08:00
duyiwei
fbc718add8 fix CVE-2022-24769 2022-06-16 10:05:51 +08:00
xiadanni
931445117a docker:update seccomp whitelist to Linux 5.10 syscall list
reason: update seccomp whitelist to Linux 5.10 syscall list to meet the
requirement that user uses image with new glibc version.

Signed-off-by: xiadanni <xiadanni1@huawei.com>
(cherry picked from commit ff5aa8ab6ec06b5101ef5787ca6f10e3f66c4a0f)
2021-10-12 14:49:09 +08:00
xiadanni
4fe3a150f4 docker:bump version again for runc fix systemd cgroup
Signed-off-by: xiadanni <xiadanni1@huawei.com>
(cherry picked from commit b7bc05d288539788c36340ccefddbc2fc7c743f1)
2021-10-12 14:49:09 +08:00
xiadanni
cb64af2f86 docker: bump version for runc fix systemd cgroup after memory type changed
Signed-off-by: xiadanni <xiadanni1@huawei.com>
(cherry picked from commit 65f671460fa1b4faf0c31407b283bf55355784d5)
2021-08-11 09:31:39 +08:00
chenjiankun
7fd3c11f8c docker:remove go-md2man build require
(cherry picked from commit 547bf388089cb8f0a8c90e8c25faa08e09b1e99b)
2021-05-06 19:36:05 +08:00
xiadanni
d2de75f5f0 docker:prevent an invalid image from crashing docker daemon
(CVE-2021-21285)

Change-Id: Ic43557af6156beb8b842e2dc9ba20eefa207abc0
Signed-off-by: xiadanni <xiadanni1@huawei.com>
(cherry picked from commit 2a49c58d90a1efd68e87b61a0a475d730875e844)
2021-03-18 15:12:04 +08:00
xiadanni
5fc83aff47 docker:Fix Access to remapped root allows privilege escalation to real root (CVE-2021-21284)
Change-Id: I483f23d368c047147932da22c80cf23c8944669b
Signed-off-by: xiadanni <xiadanni1@huawei.com>
2021-03-05 11:24:44 +08:00
xiadanni
9fba6cf9d7 docker: sync bugfix and bump version
Change-Id: I8fbbbe26d0279c9921416733ce36da9d57587240
Signed-off-by: xiadanni <xiadanni1@huawei.com>
2021-03-05 11:24:18 +08:00
jingrui
adcc59f71c docker: sync bugfix
Change-Id: Ida64f926d5d3a2a1f99c8718918737836e256897
Signed-off-by: jingrui <jingrui@huawei.com>
2021-01-18 21:44:33 +08:00
zvier
449e60b25a sync patches from internal
Signed-off-by: liuzekun <liuzekun@huawei.com>
2020-11-28 11:20:04 +08:00
Grooooot
e7de2c79b3 docker: add patches
Signed-off-by: Grooooot <isula@huawei.com>
2020-03-05 15:13:09 +08:00
overweight
6138d366d1 Package init 2019-09-30 10:37:25 -04:00