Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(deps): update module github.com/opencontainers/runc to v1.1.5 [security] #8718

Merged

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Mar 29, 2023

Mend Renovate

This PR contains the following updates:

Package Type Update Change
github.com/opencontainers/runc require patch v1.1.4 -> v1.1.5

⚠ Dependency Lookup Warnings ⚠

Warnings were logged while processing this repo. Please check the Dependency Dashboard for more information.

GitHub Vulnerability Alerts

CVE-2023-27561

runc 1.0.0-rc95 through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.


Release Notes

opencontainers/runc

v1.1.5: runc 1.1.5 -- "囚われた屈辱は 反撃の嚆矢だ"

Compare Source

This is the fifth patch release in the 1.1.z series of runc, which fixes
three CVEs found in runc.

In addition, the following other fixes are included in this release:

  • Fix the inability to use /dev/null when inside a container. (#​3620)
  • Fix changing the ownership of host's /dev/null caused by fd redirection
    (a regression in 1.1.1). (#​3674, #​3731)
  • Fix rare runc exec/enter unshare error on older kernels, including
    CentOS < 7.7. (#​3776)
  • nsexec: Check for errors in write_log(). (#​3721)
Static Linking Notices

The runc binary distributed with this release are statically linked with
the following GNU LGPL-2.1 licensed libraries, with runc acting
as a "work that uses the Library":

The versions of these libraries were not modified from their upstream versions,
but in order to comply with the LGPL-2.1 (§6(a)), we have attached the
complete source code for those libraries which (when combined with the attached
runc source code) may be used to exercise your rights under the LGPL-2.1.

However we strongly suggest that you make use of your distribution's packages
or download them from the authoritative upstream sources, especially since
these libraries are related to the security of your containers.


Thanks to all of the contributors who made this release possible:

[Due to the security-critical nature of this release, it was released
without a direct vote but was agreed to by the required number of
maintainers.]

Signed-off-by: Aleksa Sarai cyphar@cyphar.com


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@renovate renovate bot requested a review from a team as a code owner March 29, 2023 14:58
@renovate renovate bot added dependencies misc release/undocumented This didn't warrant being documented or put in release notes. labels Mar 29, 2023
@xtremerui xtremerui merged commit c0d5f99 into master Mar 30, 2023
2 of 3 checks passed
@xtremerui xtremerui deleted the renovate/go-github.com/opencontainers/runc-vulnerability branch March 30, 2023 17:35
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies misc release/undocumented This didn't warrant being documented or put in release notes.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant