UbuntuUpdates.org

Package "golang-github-opencontainers-runc-dev"

Name: golang-github-opencontainers-runc-dev

Description:

Open Container Project - development files

Latest version: 1.1.7-0ubuntu1~22.04.5
Release: jammy (22.04)
Level: security
Repository: universe
Head package: runc
Homepage: https://github.com/opencontainers/runc

Links


Download "golang-github-opencontainers-runc-dev"


Other versions of "golang-github-opencontainers-runc-dev" in Jammy

Repository Area Version
base universe 1.1.0-0ubuntu1
updates universe 1.1.7-0ubuntu1~22.04.5

Changelog

Version: 1.1.7-0ubuntu1~22.04.5 2024-07-10 09:08:22 UTC

  runc (1.1.7-0ubuntu1~22.04.5) jammy-security; urgency=medium

  * No change rebuild due to golang-1.21 update

 -- Nishit Majithia <email address hidden> Wed, 10 Jul 2024 09:51:49 +0530

Source diff to previous version

Version: 1.1.7-0ubuntu1~22.04.2 2024-02-02 22:06:58 UTC

  runc (1.1.7-0ubuntu1~22.04.2) jammy-security; urgency=medium

  * SECURITY UPDATE: container escape vulnerability
    - d/p/0001-Fix-File-to-Close.patch: Fix File to Close
    - d/p/0002-init-verify-after-chdir-that-cwd-is-inside-the-conta.patch:
      init: verify after chdir that cwd is inside the container
    - d/p/0003-setns-init-do-explicit-lookup-of-execve-argument-ear.patch:
      setns init: do explicit lookup of execve argument early
    - d/p/0004-init-close-internal-fds-before-execve.patch: init: close
      internal fds before execve
    - d/p/0005-cgroup-plug-leaks-of-sys-fs-cgroup-handle.patch: cgroup:
      plug leaks of /sys/fs/cgroup handle
    - d/p/0006-libcontainer-mark-all-non-stdio-fds-O_CLOEXEC-before.patch:
      ibcontainer: mark all non-stdio fds O_CLOEXEC before spawning init
    - CVE-2024-21626

 -- Nishit Majithia <email address hidden> Wed, 24 Jan 2024 16:40:36 +0530

CVE-2024-21626 runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal fi

Version: *DELETED* 2023-05-17 15:07:12 UTC
No changelog for deleted or moved packages.

Version: 1.1.4-0ubuntu1~22.04.3 2023-05-17 14:10:11 UTC

  runc (1.1.4-0ubuntu1~22.04.3) jammy-security; urgency=medium

  * SECURITY UPDATE: Incorrect access control through /sys/fs/cgroup
    - debian/patches/CVE-2023-25809.patch: apply MS_RDONLY if
      /sys/fs/cgroup is bind-mounted or mask if bind source is unavailable
      in libcontainer/rootfs_linux.go.
    - CVE-2023-25809
  * SECURITY UPDATE: Incorrect access control through /proc and /sys
    - debian/patches/CVE-2023-27561_2023-28642.patch: Prohibit /proc and
      /sys to be symlinks in libcontainer/rootfs_linux.go.
    - CVE-2023-27561
    - CVE-2023-28642

 -- David Fernandez Gonzalez <email address hidden> Mon, 15 May 2023 12:31:53 +0200

CVE-2023-25809 runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes
CVE-2023-27561 runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an att
CVE-2023-28642 runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` in



About   -   Send Feedback to @ubuntu_updates