RootlessKit security updates don't have to be urgent news. Learn to check, fix, and mitigate container risks on Ubuntu, Rocky Linux, SUSE – plus a repeatable automation script. Stay secure long after the CVE fades.
Just because a container runs “rootless” doesn’t mean it’s invulnerable.
In April 2026, SUSE released an important update for RootlessKit (SUSE-SU-2026:1494-1), rebuilding it against a patched Go 1.25 to close a low-level security hole. But instead of panicking over a date, let’s turn this into something you can use forever.
This guide works for any RootlessKit‑related security fix – on Ubuntu, Rocky Linux, AlmaLinux, SUSE, and derivatives.
1. How to Check If You Are Vulnerable (Distro‑Specific)
dpkg -l | grep rootlesskit # or rootlesskit --version
rpm -qa | grep rootlesskit
zypper info rootlesskit # or rpm -qi rootlesskit
What to look for:
2. Automation Script to Apply the Fix (Works on Major Distros)
#!/bin/bash # RootlessKit Security Updater – Works on Ubuntu, Rocky, SUSE # Run: chmod +x fix-rootlesskit.sh && sudo ./fix-rootlesskit.sh set -e if [ -f /etc/os-release ]; then . /etc/os-release OS=$ID VER=$VERSION_ID else echo "Cannot detect OS." exit 1 fi echo "Detected: $OS $VER" case $OS in ubuntu|debian) apt update apt install -y rootlesskit ;; rocky|almalinux|rhel|centos) dnf update -y rootlesskit ;; opensuse-leap|suse|sles) zypper refresh zypper update -y rootlesskit ;; *) echo "Unsupported OS. Update manually." exit 1 ;; esac # Verify new version echo "Updated RootlessKit version:" rootlesskit --version
chmod +x fix-rootlesskit.sh sudo ./fix-rootlesskit.sh
3. Alternative Mitigation If You Can’t Update Now
# Prevent rootlesskit-managed containers from reaching host internal services sudo iptables -I FORWARD -i docker0 -d 169.254.0.0/16 -j DROP sudo iptables -I FORWARD -i docker0 -d 127.0.0.0/8 -j DROP
abi <abi/4.0>,
include <tunables/global>
profile rootlesskit /usr/bin/rootlesskit flags=(attach_disconnected) {
include <abstractions/base>
# Deny write to sensitive kernel interfaces
deny /sys/kernel/security/** w,
deny /proc/sys/kernel/** w,
}
sudo apparmor_parser -r /etc/apparmor.d/usr.bin.rootlesskit sudo aa-enforce /usr/bin/rootlesskit

Nenhum comentário:
Postar um comentário