Bugs fixes in "runc"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2023-27561 | runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an att | 2023-05-17 |
CVE | CVE-2023-25809 | runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes | 2023-05-17 |
CVE | CVE-2023-28642 | runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` in | 2023-05-17 |
CVE | CVE-2023-27561 | runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an att | 2023-05-17 |
CVE | CVE-2023-25809 | runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes | 2023-05-17 |
CVE | CVE-2023-28642 | runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` in | 2023-05-17 |
CVE | CVE-2023-27561 | runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an att | 2023-05-17 |
CVE | CVE-2023-25809 | runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes | 2023-05-17 |
CVE | CVE-2023-28642 | runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` in | 2023-05-17 |
CVE | CVE-2023-27561 | runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an att | 2023-05-17 |
CVE | CVE-2023-25809 | runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes | 2023-05-17 |
CVE | CVE-2023-28642 | runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` in | 2023-05-17 |
CVE | CVE-2023-27561 | runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an att | 2023-05-17 |
CVE | CVE-2023-25809 | runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes | 2023-05-17 |
CVE | CVE-2023-28642 | runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` in | 2023-05-17 |
CVE | CVE-2023-27561 | runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an att | 2023-05-17 |
CVE | CVE-2023-25809 | runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes | 2023-05-17 |
CVE | CVE-2023-28642 | runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` in | 2023-05-17 |
CVE | CVE-2023-27561 | runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an att | 2023-05-17 |
CVE | CVE-2023-25809 | runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes | 2023-05-17 |
About
-
Send Feedback to @ubuntu_updates