Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

chore: bump github.com/opencontainers/runc from 1.2.3 to 1.2.8#20674

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Conversation

@dependabot
Copy link
Contributor

@dependabotdependabotbot commented on behalf ofgithubNov 5, 2025

Bumpsgithub.com/opencontainers/runc from 1.2.3 to 1.2.8.

Release notes

Sourced fromgithub.com/opencontainers/runc's releases.

runc v1.2.8 -- "鳥籠の中に囚われた屈辱を"

[!NOTE]Some vendors were given a pre-release version of this release.This public release includes two extra patches to fix regressionsdiscovered very late during the embargo period and were thus notincluded in the pre-release versions. Please update to this version.

This release contains fixes for three high-severity securityvulnerabilities in runc (CVE-2025-31133,CVE-2025-52565, andCVE-2025-52881). All three vulnerabilities ultimately allow (throughdifferent methods) for full container breakouts by bypassing runc'srestrictions for writing to arbitrary/proc files.

Security

  • CVE-2025-31133 exploits an issue with how masked paths are implemented inrunc. When masking files, runc will bind-mount the container's/dev/nullinode on top of the file. However, if an attacker can replace/dev/nullwith a symlink to some other procfs file, runc will instead bind-mount thesymlink target read-write. This issue affected all known runc versions.

  • CVE-2025-52565 is very similar in concept and application toCVE-2025-31133, except that it exploits a flaw in/dev/consolebind-mounts. When creating the/dev/console bind-mount (to/dev/pts/$n),if an attacker replaces/dev/pts/$n with a symlink then runc willbind-mount the symlink target over/dev/console. This issue affected allversions of runc >= 1.0.0-rc3.

  • CVE-2025-52881 is a more sophisticated variant ofCVE-2019-19921,which was a flaw that allowed an attacker to trick runc into writing the LSMprocess labels for a container process into a dummy tmpfs file and thus notapply the correct LSM labels to the container process. The mitigation weapplied forCVE-2019-19921 was fairly limited and effectively only causedrunc to verify that when we write LSM labels that those labels are actualprocfs files. This issue affects all known runc versions.

Static Linking Notices

Therunc binary distributed with this release arestatically linked withthe followingGNU LGPL-2.1 licensed libraries, withrunc actingas a "work that uses the Library":

... (truncated)

Changelog

Sourced fromgithub.com/opencontainers/runc's changelog.

[1.2.8] - 2025-11-05

鳥籠の中に囚われた屈辱を

Security

This release includes fixes for the following high-severity security issues:

  • CVE-2025-31133 exploits an issue with how masked paths are implemented inrunc. When masking files, runc will bind-mount the container's/dev/nullinode on top of the file. However, if an attacker can replace/dev/nullwith a symlink to some other procfs file, runc will instead bind-mount thesymlink target read-write. This issue affected all known runc versions.

  • CVE-2025-52565 is very similar in concept and application toCVE-2025-31133, except that it exploits a flaw in/dev/consolebind-mounts. When creating the/dev/console bind-mount (to/dev/pts/$n),if an attacker replaces/dev/pts/$n with a symlink then runc willbind-mount the symlink target over/dev/console. This issue affected allversions of runc >= 1.0.0-rc3.

  • CVE-2025-52881 is a more sophisticated variant ofCVE-2019-19921,which was a flaw that allowed an attacker to trick runc into writing the LSMprocess labels for a container process into a dummy tmpfs file and thus notapply the correct LSM labels to the container process. The mitigation weapplied forCVE-2019-19921 was fairly limited and effectively only causedrunc to verify that when we write LSM labels that those labels are actualprocfs files. This issue affects all known runc versions.

[1.2.7] - 2025-09-05

さんをつけろよデコ助野郎!

Fixed

  • Removed preemptive "full access to cgroups" warning when callingrunc pause orrunc unpause as an unprivileged user without--systemd-cgroups. Now the warning is only emitted if an actual permissionerror was encountered. (#4709,#4720)
  • Add time namespace to container config after checkpoint/restore. CRIU sinceversion 3.14 uses a time namespace for checkpoint/restore, however it wasnot joining the time namespace in runc. (#4696,#4714)
  • Container processes will no longer inherit the CPU affinity of runc bydefault. Instead, the default CPU affinity of container processes will bethe largest set of CPUs permitted by the container's cpuset cgroup and anyother system restrictions (such as isolated CPUs). (#4041,#4815,#4858)

... (truncated)

Commits
  • eeb7e60 VERSION: release v1.2.8
  • cdee962 merge private security patches into ghsa-release-1.2.8
  • b4cb2f5 rootfs: re-allow dangling symlinks in mount targets
  • ee56b85 openat2: improve resilience on busy systems
  • 2462b68 Merge pull request#4943 from lifubang/backport-1.2-4934-4937
  • 99e41a5 ci: only run lint-extra job on PRs to main
  • f2a1c98 CI: remove deprecated lima-vm/lima-actions/ssh
  • 8f90185 selinux: use safe procfs API for labels
  • 948d6e9 rootfs: switch to fd-based handling of mountpoint targets
  • 7aa42ad libct: align param type for mountCgroupV1/V2 functions
  • Additional commits viewable incompare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting@dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from theSecurity Alerts page.

Bumps [github.com/opencontainers/runc](https://github.com/opencontainers/runc) from 1.2.3 to 1.2.8.- [Release notes](https://github.com/opencontainers/runc/releases)- [Changelog](https://github.com/opencontainers/runc/blob/v1.2.8/CHANGELOG.md)- [Commits](opencontainers/runc@v1.2.3...v1.2.8)---updated-dependencies:- dependency-name: github.com/opencontainers/runc  dependency-version: 1.2.8  dependency-type: indirect...Signed-off-by: dependabot[bot] <support@github.com>
@dependabotdependabotbot added dependenciesPull requests that update a dependency file goPull requests that update go code labelsNov 5, 2025
@github-actionsgithub-actionsbotenabled auto-merge (squash)November 5, 2025 16:50
@github-actionsgithub-actionsbot merged commitab93943 intomainNov 5, 2025
34 checks passed
@github-actionsgithub-actionsbot deleted the dependabot/go_modules/github.com/opencontainers/runc-1.2.8 branchNovember 5, 2025 17:01
Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment

Reviewers

@github-actionsgithub-actions[bot]github-actions[bot] approved these changes

Assignees

No one assigned

Labels

dependenciesPull requests that update a dependency filegoPull requests that update go code

Projects

None yet

Milestone

No milestone

Development

Successfully merging this pull request may close these issues.

1 participant


[8]ページ先頭

©2009-2025 Movatter.jp