Replies: 2 comments 4 replies
-
Those packages would've been built using the packaging scripts at this commit (or the commit after); https://github.com/docker/containerd-packaging/tree/efc8bdfed6e202db185797d17e6221e24149f861 All those versions you mentioned are EOL since a long time though, including CentOS 7, so I would highly recommend upgrading to something more current as there's various unpatched vulnerabilities in those versions. |
Beta Was this translation helpful? Give feedback.
1 reply
-
Curious about the fips keywords that pop up in the symbols. Was runc built previously with FIPS compliance? |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
In some of our environments, we deployed docker v19 version:
Recently, when I investigated a problem caused by parallel execution of
docker exec
, I found the the problem was caused by runc. The weird part was when I replaced the runc with the one built by myself using the same commit, the problem was gone. After some digging, I found the one I built is different from the one shipped with containerd v1.2.0.The containerd rpm was downloaded from here: https://download.docker.com/linux/centos/7/x86_64/stable/Packages/containerd.io-1.2.0-3.el7.x86_64.rpm
After unpacked it with rpm2cpio, I used ldd and objdump to find out its content:
Questions:
I cannot find any text in the codebase related to libssl or libdl, it seems like it can only be injected with
EXTRA_LDFLAGS
?Does anyone know the history?
Beta Was this translation helpful? Give feedback.
All reactions