UbuntuUpdates.org

Package "runc"

Name: runc

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Open Container Project - development files

Latest version: 1.1.7-0ubuntu1~23.04.2
Release: lunar (23.04)
Level: security
Repository: universe

Links



Other versions of "runc" in Lunar

Repository Area Version
base universe 1.1.4-0ubuntu3
base main 1.1.4-0ubuntu3
security main 1.1.7-0ubuntu1~23.04.2
updates universe 1.1.7-0ubuntu1~23.04.2
updates main 1.1.7-0ubuntu1~23.04.2

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1.1.7-0ubuntu1~23.04.2 2024-01-18 08:06:57 UTC

  runc (1.1.7-0ubuntu1~23.04.2) lunar-security; urgency=medium

  * No change rebuild due to golang-1.20, golang-1.21 updates

 -- Nishit Majithia <email address hidden> Thu, 18 Jan 2024 09:19:45 +0530

Source diff to previous version

Version: 1.1.4-0ubuntu3.1 2023-05-17 14:10:11 UTC

  runc (1.1.4-0ubuntu3.1) lunar-security; urgency=medium

  * SECURITY UPDATE: Incorrect access control through /sys/fs/cgroup
    - debian/patches/CVE-2023-25809.patch: apply MS_RDONLY if
      /sys/fs/cgroup is bind-mounted or mask if bind source is unavailable
      in libcontainer/rootfs_linux.go.
    - CVE-2023-25809
  * SECURITY UPDATE: Incorrect access control through /proc and /sys
    - debian/patches/CVE-2023-27561_2023-28642.patch: Prohibit /proc and
      /sys to be symlinks in libcontainer/rootfs_linux.go.
    - CVE-2023-27561
    - CVE-2023-28642

 -- David Fernandez Gonzalez <email address hidden> Mon, 15 May 2023 13:19:29 +0200

CVE-2023-25809 runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes
CVE-2023-27561 runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an att
CVE-2023-28642 runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` in



About   -   Send Feedback to @ubuntu_updates