Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update to runc 1.1.2 #357

Closed
kokizzu opened this issue May 25, 2022 · 3 comments
Closed

update to runc 1.1.2 #357

kokizzu opened this issue May 25, 2022 · 3 comments

Comments

@kokizzu
Copy link

kokizzu commented May 25, 2022

dependabot reporting CVE

Package / Affected versions / Patched version

github.com/opencontainers/runc (Go)
< 1.1.2
1.1.2

Impact

A bug was found in runc where runc exec --cap executed processes with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2).

This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set.
Patches

This bug has been fixed in runc 1.1.2. Users should update to this version as soon as possible.

This fix changes runc exec --cap behavior such that the additional capabilities granted to the process being executed (as specified via --cap arguments) do not include inheritable capabilities.

In addition, runc spec is changed to not set any inheritable capabilities in the created example OCI spec (config.json) file.

Credits

The opencontainers project would like to thank Andrew G. Morgan for responsibly disclosing this issue in accordance with the opencontainers org security policy.
For more information

If you have any questions or comments about this advisory:

[Open an issue](https://github.com/opencontainers/runc/issues/new)
Email us at [security@opencontainers.org](mailto:security@opencontainers.org) if you think you’ve found a security bug
@kokizzu
Copy link
Author

kokizzu commented May 25, 2022

#355

@kokizzu
Copy link
Author

kokizzu commented May 26, 2022

please release a new version :3

@aeneasr
Copy link
Member

aeneasr commented May 26, 2022

you can use go.mod rewrites if a version is not released, but i'll of course do that :)

@aeneasr aeneasr closed this as completed May 26, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants