Skip to content

Commit b27a7b8

Browse files
committed
conversion: mention the potential risks of blindly copying annotations
While the ability to copy arbitrary container labels into the generated runtime-spec is a very useful feature, it needs to be mentioned that some runtime-spec annotations (such as "org.systemd.property.*" and "run.oci.hooks.*") can allow an image to cause runtimes to either configure an insecure container or act as a way to attack the host machine. It should be noted this is no different to any other malicious config.json attack -- it is the responsibility of runtime-spec generators to make sure the configuration is secure. Reported-by: Akihiro Suda <[email protected]> Signed-off-by: Aleksa Sarai <[email protected]>
1 parent af08f4c commit b27a7b8

File tree

1 file changed

+5
-0
lines changed

1 file changed

+5
-0
lines changed

conversion.md

+5
Original file line numberDiff line numberDiff line change
@@ -128,3 +128,8 @@ If there is a conflict (same key but different value) between an implicit annota
128128

129129
A converter MAY add annotations which have keys not specified in the image.
130130
A converter MUST NOT modify the values of annotations specified in the image.
131+
132+
Note there is a risk that some annotations might be used by container runtimes to do operations that pose a security risk (such as running container hooks on the host or modifying security-related aspects of the container configuration).
133+
As with any runtime specification configuration, generators SHOULD verify that the generated container configuration is safe before it is used to create a container.
134+
A converter MAY choose to not include annotations specified in the image, if the annotations are considered to be unsafe by the converter's security policy.
135+
If a converter does omit annotations during the conversion, it SHOULD provide feedback to the user to indicate that an annotation has not been converted.

0 commit comments

Comments
 (0)