dockertest
dockertest copied to clipboard
chore(deps): bump github.com/opencontainers/runc from 1.1.13 to 1.1.15
Bumps github.com/opencontainers/runc from 1.1.13 to 1.1.15.
Release notes
Sourced from github.com/opencontainers/runc's releases.
runc v1.1.14 -- "年を取っていいことは、驚かなくなることね。"
This is the fourteenth patch release in the 1.1.z release branch of runc. It includes a fix for a low severity security issue (CVE-2024-45310) as well as some minor build-related fixes (including Go 1.23 support).
- Fix CVE-2024-45310, a low-severity attack that allowed maliciously configured containers to create empty files and directories on the host.
- Add support for Go 1.23. (#4360, #4372)
- Revert "allow overriding VERSION value in Makefile" and add EXTRA_VERSION. (#4370, #4382)
- rootfs: consolidate mountpoint creation logic. (#4359)
Static Linking Notices
The
runcbinary distributed with this release are statically linked with the following GNU LGPL-2.1 licensed libraries, withruncacting as a "work that uses the Library":The versions of these libraries were not modified from their upstream versions, but in order to comply with the LGPL-2.1 (§6(a)), we have attached the complete source code for those libraries which (when combined with the attached runc source code) may be used to exercise your rights under the LGPL-2.1.
However we strongly suggest that you make use of your distribution's packages or download them from the authoritative upstream sources, especially since these libraries are related to the security of your containers.
Thanks to all of the contributors who made this release possible:
- Akihiro Suda [email protected]
- Aleksa Sarai [email protected]
- Kir Kolyshkin [email protected]
- Rodrigo Campos [email protected]
- Sebastiaan van Stijn [email protected]
- lifubang [email protected]
Signed-off-by: Aleksa Sarai [email protected]
Changelog
Sourced from github.com/opencontainers/runc's changelog.
[1.1.15] - 2024-10-07
How, dear sir, did you cross the flood? By not stopping, friend, and by not straining I crossed the flood.
Fixed
- The
-ENOSYSseccomp stub is now always generated for the native architecture thatruncis running on. This is needed to work around some arguably specification-incompliant behaviour from Docker on architectures such as ppc64le, where the allowed architecture list is set tonull. This ensures that we always generate at least one-ENOSYSstub for the native architecture even with these weird configs. (#4391)- On a system with older kernel, reading
/proc/self/mountinfomay skip some entries, as a consequence runc may not properly set mount propagation, causing container mounts leak onto the host mount namespace. (#2404, #4425)Removed
- In order to fix performance issues in the "lightweight" bindfd protection against CVE-2019-5736, the temporary
robind-mount of/proc/self/exehas been removed. runc now creates a binary copy in all cases. (#4392, #2532)[1.1.14] - 2024-09-03
年を取っていいことは、驚かなくなることね。
Security
- Fix CVE-2024-45310, a low-severity attack that allowed maliciously configured containers to create empty files and directories on the host.
Added
Fixed
Commits
bc20cb4VERSION: release 1.1.152790485CHANGELOG: Remove empty changed lineed38aeaMerge pull request #4425 from kolyshkin/1.1-fix-mount-leak65aa700[1.1] runc run: fix mount leaka4cebd3Merge pull request #4423 from rata/1-1-fix-CI719e2bcincrease memory.max in cgroups.bats3216d3bmerge #4391 into opencontainers/runc:release-1.1bd671b6Merge pull request #4392 from cyphar/1.1-remove-bindfd614ce12[1.1] nsenter: cloned_binary: remove bindfd logic entirely618e149[1.1] seccomp: patchbpf: always include native architecture in stub- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
It would be great to get this to resolve CVE-2024-45310