package/runc: security bump to 1.0.0-rc9
authorChristian Stewart <christian@paral.in>
Tue, 3 Dec 2019 04:50:00 +0000 (20:50 -0800)
committerPeter Korsgaard <peter@korsgaard.com>
Sun, 5 Jan 2020 21:22:19 +0000 (22:22 +0100)
Fixes the following security vulnerability:

- CVE-2019-16884: runc through 1.0.0-rc8, as used in Docker through
  19.03.2-ce and other products, allows AppArmor restriction bypass because
  libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a
  malicious Docker image can mount over a /proc directory.

Signed-off-by: Christian Stewart <christian@paral.in>
[Peter: mention security impact]
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
package/runc/runc.hash
package/runc/runc.mk

index 4f663affc44f3975c9f52c739845df606dbfed0d..3e8eff3ccae1a489f4334413e2c3d81a4dd00941 100644 (file)
@@ -1,3 +1,3 @@
 # Locally computed
-sha256 efe4ff9bbe49b19074346d65c914d809c0a3e90d062ea9619fe240f931f0b700  runc-1.0.0-rc8.tar.gz
+sha256 2ec69c25df9f02c6fd38eb287145f8afba6772f809abe01df4534b5bfd68e8d4  runc-1.0.0-rc9.tar.gz
 sha256  552a739c3b25792263f731542238b92f6f8d07e9a488eae27e6c4690038a8243  LICENSE
index b858742905124a3c0ecc0297291f7ca345433965..acf61ab1600354b849f39952bec3763be1ffda5e 100644 (file)
@@ -4,7 +4,7 @@
 #
 ################################################################################
 
-RUNC_VERSION = 1.0.0-rc8
+RUNC_VERSION = 1.0.0-rc9
 RUNC_SITE = $(call github,opencontainers,runc,v$(RUNC_VERSION))
 RUNC_LICENSE = Apache-2.0
 RUNC_LICENSE_FILES = LICENSE