File _patchinfo of Package patchinfo.28472
<patchinfo incident="28472">
<issue tracker="cve" id="2023-28642"/>
<issue tracker="cve" id="2023-25809"/>
<issue tracker="cve" id="2023-27561"/>
<issue tracker="bnc" id="1168481">/dev/null not accessable in containers</issue>
<issue tracker="bnc" id="1208962">VUL-0: CVE-2023-27561: runc,docker-runc: Fix for CVE-2019-19921 broken by fix for CVE-2021-30465</issue>
<issue tracker="bnc" id="1209884">VUL-0: CVE-2023-25809: runc: rootless `/sys/fs/cgroup` is writable when cgroupns isn't unshared</issue>
<issue tracker="bnc" id="1209888">VUL-0: CVE-2023-28642: runc: AppArmor/SELinux bypass with symlinked /proc</issue>
<packager>cyphar</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for runc</summary>
<description>This update for runc fixes the following issues:
Update to runc v1.1.5:
Security fixes:
- CVE-2023-25809: Fixed rootless `/sys/fs/cgroup` is writable when cgroupns isn't unshared (bnc#1209884).
- CVE-2023-27561: Fixed regression that reintroduced CVE-2019-19921 vulnerability (bnc#1208962).
- CVE-2023-28642: Fixed AppArmor/SELinux bypass with symlinked /proc (bnc#1209888).
Other fixes:
- Fix the inability to use `/dev/null` when inside a container.
- Fix changing the ownership of host's `/dev/null` caused by fd redirection (bsc#1168481).
- Fix rare runc exec/enter unshare error on older kernels.
- nsexec: Check for errors in `write_log()`.
- Drop version-specific Go requirement.
</description>
</patchinfo>