runc: security bump to fix CVE-2016-9962
authorPeter Korsgaard <peter@korsgaard.com>
Sun, 22 Jan 2017 21:39:56 +0000 (22:39 +0100)
committerThomas Petazzoni <thomas.petazzoni@free-electrons.com>
Mon, 23 Jan 2017 08:07:48 +0000 (19:07 +1100)
RunC allowed additional container processes via runc exec to be ptraced by
the pid 1 of the container.  This allows the main processes of the
container, if running as root, to gain access to file-descriptors of these
new processes during the initialization and can lead to container escapes or
modification of runC state before the process is fully placed inside the
container.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
package/runc/runc.hash
package/runc/runc.mk

index 5b5400eeea355016cf250afbc07b60bd17bd264c..0b6a24ffcb166a165cbd3f5d2d6ee759d9acb079 100644 (file)
@@ -1,2 +1,2 @@
 # Locally computed
-sha256 638742c48426b9a3281aeb619e27513d972de228bdbd43b478baea99c186d491  runc-v1.0.0-rc2.tar.gz
+sha256 374822cc2895ed3899b7a3a03b566413ea782fccec1307231f27894e9c6d5bea  runc-50a19c6ff828c58e5dab13830bd3dacde268afe5.tar.gz
index 661872c9626e0aac2a9bb65fff9054941e3a2c5d..95afcaaff80ef9934d0d20157a9c723c1f74bc40 100644 (file)
@@ -4,7 +4,7 @@
 #
 ################################################################################
 
-RUNC_VERSION = v1.0.0-rc2
+RUNC_VERSION = 50a19c6ff828c58e5dab13830bd3dacde268afe5
 RUNC_SITE = $(call github,opencontainers,runc,$(RUNC_VERSION))
 RUNC_LICENSE = Apache-2.0
 RUNC_LICENSE_FILES = LICENSE