rancher-sandbox / rancher-desktop

Container Management and Kubernetes on the Desktop
https://rancherdesktop.io
Apache License 2.0
5.82k stars 272 forks source link

macOS Monterey 12.5.1 - "Rancher Desktop" is damaged and can't be opened. #2803

Closed carolgschwend closed 2 years ago

carolgschwend commented 2 years ago

Discussed in https://github.com/rancher-sandbox/rancher-desktop/discussions/2792

Originally posted by **carolgschwend** August 21, 2022 After upgrading to macOS Monterey 12.5.1 today I got a fatal error upon starting rancher. After uninstalling rancher, I'm not able to open and install new downloaded rancher files. Can anyone verify rancher works with Monterey 12.5.1 ? Fatal Error ![image](https://user-images.githubusercontent.com/21066111/185808511-9d7d170e-526a-454c-9192-ef1570789be6.png) Damaged and can't be opened ![image](https://user-images.githubusercontent.com/21066111/185808532-80106c3c-be57-4cbe-92ca-96dd3d4a27ce.png)

Our Cisco Secure Endpoint is flagging Rancher as CVE and preventing downloads. image

adamkpickering commented 2 years ago

It seems like there are lots of issues associated with the 12.5.1 macOS upgrade on M1, not just this one. Hang tight, we're working on it.

adamkpickering commented 2 years ago

Also, this is a possible duplicate of #2793 and of #2798.

AkihiroSuda commented 2 years ago

Osx.Exploit.CVE_2021_4034-9951522-2

This CVE doesn't seem relevant to macOS / Lima 🤔 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034

A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.

jandubois commented 2 years ago

Also, this is a possible duplicate of #2793 and of #2798.

This seems to be the case.