Skip to content

Conversation

tangentsoft
Copy link
Contributor

The prior version talked about potential access to DBus, but this is a bogus warning: default OS setups do not bind DBus to localhost or to an abstract Unix socket. It is possible that the original author was thinking of CVE-2020–15257, which affected containerd's abstract Unix socket; they fixed it by switching to a named socket, just as DBus always (?) has done.

Does this PR introduce a user-facing change?

Yes.

Clarified the documentation for the `--network=host` option accepted by `podman run/create`.

Copy link
Member

@Luap99 Luap99 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, thank you.

Copy link
Contributor

openshift-ci bot commented Jun 2, 2025

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: Luap99, tangentsoft

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jun 2, 2025
@Luap99
Copy link
Member

Luap99 commented Jun 2, 2025

Oh looks like cirrus CI wasn't triggered correctly, can you please force push this again to trigger it.

Copy link

[NON-BLOCKING] Packit jobs failed. @containers/packit-build please check. Everyone else, feel free to ignore.

- **container:**_id_: Reuse another container's network stack.

- **host**: Do not create a network namespace, the container uses the host's network. Note: The host mode gives the container full access to local system services such as D-bus and is therefore considered insecure.
- **host**: Use the host's network namespace for the container instead of creating an isolated namespace. Warning: This gives the container full access to abstract Unix domain sockets and to TCP/UDP sockets bound to localhost. Since these mechanisms are often used to prevent access to sensitive system services, isolating them from access by external entities, use of this option may be counted a security hole.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe "may be considered a security vulnerability" instead of "may be counted as a security hole"?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have no objections to someone else "finishing" this PR. I pushed it more to instigate change than to get a particular expression of that change landed.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

fixed the comment and force pushed to your branch so we can get this merged.

@mheon
Copy link
Member

mheon commented Jun 2, 2025

Minor rewording suggestion, overall looks fine.

The prior version talked about potential access to DBus, but this is a
bogus warning: default OS setups do not bind DBus to localhost or to an
abstract Unix socket.  It is possible that the original author was
thinking of CVE-2020–15257, which affected containerd's abstract Unix
socket; they fixed it by switching to a named socket, just as DBus
always (?) has done.

Signed-off-by: Warren Young <[email protected]>
Signed-off-by: Paul Holzinger <[email protected]>
@Luap99 Luap99 force-pushed the network-host-doc-warning branch from 56a070a to 0080368 Compare June 10, 2025 16:48
@mheon
Copy link
Member

mheon commented Jun 12, 2025

LGTM

@Luap99
Copy link
Member

Luap99 commented Jun 12, 2025

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Jun 12, 2025
@openshift-merge-bot openshift-merge-bot bot merged commit 98e6d85 into containers:main Jun 12, 2025
35 of 36 checks passed
@stale-locking-app stale-locking-app bot added the locked - please file new issue/PR Assist humans wanting to comment on an old issue or PR with locked comments. label Sep 11, 2025
@stale-locking-app stale-locking-app bot locked as resolved and limited conversation to collaborators Sep 11, 2025
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged. locked - please file new issue/PR Assist humans wanting to comment on an old issue or PR with locked comments. release-note
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants