UbuntuUpdates.org

Package "runc"

Name: runc

Description:

Open Container Project - runtime

Latest version: 1.1.7-0ubuntu1~20.04.2
Release: focal (20.04)
Level: security
Repository: main
Homepage: https://github.com/opencontainers/runc

Links


Download "runc"


Other versions of "runc" in Focal

Repository Area Version
base main 1.0.0~rc10-0ubuntu1
updates main 1.1.7-0ubuntu1~20.04.2

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1.1.7-0ubuntu1~20.04.2 2024-01-31 21:10:42 UTC

  runc (1.1.7-0ubuntu1~20.04.2) focal-security; urgency=medium

  * SECURITY UPDATE: container escape vulnerability
    - d/p/0001-Fix-File-to-Close.patch: Fix File to Close
    - d/p/0002-init-verify-after-chdir-that-cwd-is-inside-the-conta.patch:
      init: verify after chdir that cwd is inside the container
    - d/p/0003-setns-init-do-explicit-lookup-of-execve-argument-ear.patch:
      setns init: do explicit lookup of execve argument early
    - d/p/0004-init-close-internal-fds-before-execve.patch: init: close
      internal fds before execve
    - d/p/0005-cgroup-plug-leaks-of-sys-fs-cgroup-handle.patch: cgroup:
      plug leaks of /sys/fs/cgroup handle
    - d/p/0006-libcontainer-mark-all-non-stdio-fds-O_CLOEXEC-before.patch:
      ibcontainer: mark all non-stdio fds O_CLOEXEC before spawning init
    - CVE-2024-21626

 -- Nishit Majithia <email address hidden> Wed, 24 Jan 2024 16:33:42 +0530

Source diff to previous version

Version: 1.1.4-0ubuntu1~20.04.3 2023-05-17 17:07:45 UTC

  runc (1.1.4-0ubuntu1~20.04.3) focal-security; urgency=medium

  * SECURITY UPDATE: Incorrect access control through /sys/fs/cgroup
    - debian/patches/CVE-2023-25809.patch: apply MS_RDONLY if
      /sys/fs/cgroup is bind-mounted or mask if bind source is unavailable
      in libcontainer/rootfs_linux.go.
    - CVE-2023-25809
  * SECURITY UPDATE: Incorrect access control through /proc and /sys
    - debian/patches/CVE-2023-27561_2023-28642.patch: Prohibit /proc and
      /sys to be symlinks in libcontainer/rootfs_linux.go.
    - CVE-2023-27561
    - CVE-2023-28642

 -- David Fernandez Gonzalez <email address hidden> Mon, 15 May 2023 12:15:47 +0200

Source diff to previous version
CVE-2023-25809 runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes
CVE-2023-27561 runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an att
CVE-2023-28642 runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` in

Version: 1.0.0~rc95-0ubuntu1~20.04.2 2021-07-26 16:06:25 UTC

  runc (1.0.0~rc95-0ubuntu1~20.04.2) focal-security; urgency=medium

  * No change rebuild in -security pocket. (LP: #1937286)

 -- Marc Deslauriers <email address hidden> Fri, 23 Jul 2021 14:45:39 -0400

Source diff to previous version

Version: 1.0.0~rc93-0ubuntu1~20.04.2 2021-05-19 11:06:22 UTC

  runc (1.0.0~rc93-0ubuntu1~20.04.2) focal-security; urgency=medium

  * SECURITY UPDATE: symlink exchange attack
    - debian/patches/CVE-2021-30465/*.patch: upstream patches to add mount
      destination validation.
    - CVE-2021-30465

 -- Marc Deslauriers <email address hidden> Wed, 05 May 2021 14:27:26 -0400




About   -   Send Feedback to @ubuntu_updates