Replies: 2 comments 4 replies
-
Those packages would've been built using the packaging scripts at this commit (or the commit after); https://github.com/docker/containerd-packaging/tree/efc8bdfed6e202db185797d17e6221e24149f861 All those versions you mentioned are EOL since a long time though, including CentOS 7, so I would highly recommend upgrading to something more current as there's various unpatched vulnerabilities in those versions. |
Beta Was this translation helpful? Give feedback.
1 reply
-
Curious about the fips keywords that pop up in the symbols. Was runc built previously with FIPS compliance? |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
In some of our environments, we deployed docker v19 version:
Recently, when I investigated a problem caused by parallel execution of
docker exec
, I found the the problem was caused by runc. The weird part was when I replaced the runc with the one built by myself using the same commit, the problem was gone. After some digging, I found the one I built is different from the one shipped with containerd v1.2.0.The containerd rpm was downloaded from here: https://download.docker.com/linux/centos/7/x86_64/stable/Packages/containerd.io-1.2.0-3.el7.x86_64.rpm
After unpacked it with rpm2cpio, I used ldd and objdump to find out its content:
Questions:
I cannot find any text in the codebase related to libssl or libdl, it seems like it can only be injected with
EXTRA_LDFLAGS
?Does anyone know the history?
Beta Was this translation helpful? Give feedback.
All reactions