[ALSA-2023:6380] runc security update
Severity
Moderate
Affected Packages
2
CVEs
5
runc security update
The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.
Security Fix(es):
- golang: crypto/tls: large handshake records may cause panics (CVE-2022-41724)
- runc: Rootless runc makes
/sys/fs/cgroup
writable (CVE-2023-25809) - runc: volume mount race condition (regression of CVE-2019-19921) (CVE-2023-27561)
- runc: AppArmor can be bypassed when
/proc
inside the container is symlinked with a specific mount configuration (CVE-2023-28642) - runc: integer overflow in netlink bytemsg length field allows attacker to override netlink-based container configuration (CVE-2021-43784)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
Package | Affected Version |
---|---|
pkg:rpm/almalinux/runc?arch=x86_64&distro=almalinux-9 | < 1.1.9-1.el9 |
pkg:rpm/almalinux/runc?arch=aarch64&distro=almalinux-9 | < 1.1.9-1.el9 |
- ID
- ALSA-2023:6380
- Severity
- moderate
- URL
- https://errata.almalinux.org/ALSA-2023:6380.html
- Published
-
2023-11-07T00:00:00
(10 months ago) - Modified
-
2023-11-14T12:05:08
(10 months ago) - Rights
- Copyright 2023 AlmaLinux OS
- Other Advisories
-
- ALAS-2023-1731
- ALAS-2023-1848
- ALAS2-2023-2015
- ALAS2-2023-2163
- ALPINE:CVE-2021-43784
- ALPINE:CVE-2022-41724
- ALPINE:CVE-2023-25809
- ALPINE:CVE-2023-27561
- ALPINE:CVE-2023-28642
- ALSA-2023:3083
- ALSA-2023:6363
- ALSA-2023:6402
- ALSA-2023:6473
- ALSA-2023:6474
- ALSA-2023:6938
- ALSA-2023:6939
- ELSA-2023-12578
- ELSA-2023-12579
- ELSA-2023-3083
- ELSA-2023-6363
- ELSA-2023-6380
- ELSA-2023-6402
- ELSA-2023-6473
- ELSA-2023-6474
- ELSA-2023-6938
- ELSA-2023-6939
- FEDORA-2023-1ba499965f
- FEDORA-2023-1bcbb1db39
- FEDORA-2023-3cccbc4c95
- FEDORA-2023-6e6d9065e0
- FEDORA-2023-9edf2145fb
- FREEBSD:3D73E384-AD1F-11ED-983C-83FE35862E3A
- GLSA-202311-09
- GLSA-202408-25
- GO-2022-0274
- GO-2023-1570
- MS:CVE-2021-43784
- MS:CVE-2023-25809
- MS:CVE-2023-28642
- openSUSE-SU-2021:1625-1
- openSUSE-SU-2021:4171-1
- RHBA-2023:2181
- RHSA-2023:3083
- RHSA-2023:6363
- RHSA-2023:6380
- RHSA-2023:6402
- RHSA-2023:6473
- RHSA-2023:6474
- RHSA-2023:6938
- RHSA-2023:6939
- SUSE-SU-2021:4059-1
- SUSE-SU-2021:4171-1
- SUSE-SU-2023:0733-1
- SUSE-SU-2023:0735-1
- SUSE-SU-2023:0869-1
- SUSE-SU-2023:0871-1
- SUSE-SU-2023:1726-1
- SUSE-SU-2023:2003-1
- SUSE-SU-2023:2312-1
- USN-6088-1
- USN-6088-2
- USN-6140-1
Source | # ID | Name | URL |
---|---|---|---|
RHSA | RHSA-2023:6380 | https://access.redhat.com/errata/RHSA-2023:6380 | |
CVE | CVE-2021-43784 | https://access.redhat.com/security/cve/CVE-2021-43784 | |
CVE | CVE-2022-41724 | https://access.redhat.com/security/cve/CVE-2022-41724 | |
CVE | CVE-2023-25809 | https://access.redhat.com/security/cve/CVE-2023-25809 | |
CVE | CVE-2023-27561 | https://access.redhat.com/security/cve/CVE-2023-27561 | |
CVE | CVE-2023-28642 | https://access.redhat.com/security/cve/CVE-2023-28642 | |
Bugzilla | 2029439 | https://bugzilla.redhat.com/2029439 | |
Bugzilla | 2175721 | https://bugzilla.redhat.com/2175721 | |
Bugzilla | 2178492 | https://bugzilla.redhat.com/2178492 | |
Bugzilla | 2182883 | https://bugzilla.redhat.com/2182883 | |
Bugzilla | 2182884 | https://bugzilla.redhat.com/2182884 | |
Self | ALSA-2023:6380 | https://errata.almalinux.org/9/ALSA-2023-6380.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/almalinux/runc?arch=x86_64&distro=almalinux-9 | almalinux | runc | < 1.1.9-1.el9 | almalinux-9 | x86_64 | |
Affected | pkg:rpm/almalinux/runc?arch=aarch64&distro=almalinux-9 | almalinux | runc | < 1.1.9-1.el9 | almalinux-9 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |