Package "runc"
Name: |
runc
|
Description: |
Open Container Project - runtime
|
Latest version: |
1.1.7-0ubuntu1~22.04.2 |
Release: |
jammy (22.04) |
Level: |
security |
Repository: |
main |
Homepage: |
https://github.com/opencontainers/runc |
Links
Download "runc"
Other versions of "runc" in Jammy
Changelog
runc (1.1.7-0ubuntu1~22.04.2) jammy-security; urgency=medium
* SECURITY UPDATE: container escape vulnerability
- d/p/0001-Fix-File-to-Close.patch: Fix File to Close
- d/p/0002-init-verify-after-chdir-that-cwd-is-inside-the-conta.patch:
init: verify after chdir that cwd is inside the container
- d/p/0003-setns-init-do-explicit-lookup-of-execve-argument-ear.patch:
setns init: do explicit lookup of execve argument early
- d/p/0004-init-close-internal-fds-before-execve.patch: init: close
internal fds before execve
- d/p/0005-cgroup-plug-leaks-of-sys-fs-cgroup-handle.patch: cgroup:
plug leaks of /sys/fs/cgroup handle
- d/p/0006-libcontainer-mark-all-non-stdio-fds-O_CLOEXEC-before.patch:
ibcontainer: mark all non-stdio fds O_CLOEXEC before spawning init
- CVE-2024-21626
-- Nishit Majithia <email address hidden> Wed, 24 Jan 2024 16:40:36 +0530
|
Source diff to previous version |
runc (1.1.4-0ubuntu1~22.04.3) jammy-security; urgency=medium
* SECURITY UPDATE: Incorrect access control through /sys/fs/cgroup
- debian/patches/CVE-2023-25809.patch: apply MS_RDONLY if
/sys/fs/cgroup is bind-mounted or mask if bind source is unavailable
in libcontainer/rootfs_linux.go.
- CVE-2023-25809
* SECURITY UPDATE: Incorrect access control through /proc and /sys
- debian/patches/CVE-2023-27561_2023-28642.patch: Prohibit /proc and
/sys to be symlinks in libcontainer/rootfs_linux.go.
- CVE-2023-27561
- CVE-2023-28642
-- David Fernandez Gonzalez <email address hidden> Mon, 15 May 2023 12:31:53 +0200
|
CVE-2023-25809 |
runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes |
CVE-2023-27561 |
runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an att |
CVE-2023-28642 |
runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` in |
|
About
-
Send Feedback to @ubuntu_updates