runc: security bump to fix CVE-2016-9962
RunC allowed additional container processes via runc exec to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container. Signed-off-by: Peter Korsgaard <peter@korsgaard.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
This commit is contained in:
parent
157ddf77e4
commit
d6706dc430
@ -1,2 +1,2 @@
|
||||
# Locally computed
|
||||
sha256 638742c48426b9a3281aeb619e27513d972de228bdbd43b478baea99c186d491 runc-v1.0.0-rc2.tar.gz
|
||||
sha256 374822cc2895ed3899b7a3a03b566413ea782fccec1307231f27894e9c6d5bea runc-50a19c6ff828c58e5dab13830bd3dacde268afe5.tar.gz
|
||||
|
@ -4,7 +4,7 @@
|
||||
#
|
||||
################################################################################
|
||||
|
||||
RUNC_VERSION = v1.0.0-rc2
|
||||
RUNC_VERSION = 50a19c6ff828c58e5dab13830bd3dacde268afe5
|
||||
RUNC_SITE = $(call github,opencontainers,runc,$(RUNC_VERSION))
|
||||
RUNC_LICENSE = Apache-2.0
|
||||
RUNC_LICENSE_FILES = LICENSE
|
||||
|
Loading…
Reference in New Issue
Block a user