Debian Bug report logs -
#1033520
runc: CVE-2023-27561
Package:
src:runc;
Maintainer for src:runc is Debian Go Packaging Team <team+pkg-go@trackerdebianorg>;
Reported by: Salvatore Bonaccorso <carnil@debianorg>
Date: Sun, 26 Mar 2023 15:36:02 UTC
Severity: important
Tags: security, upstream
Found in version runc/ ...
Synopsis
Moderate: OpenShift Container Platform 4136 security and extras update
Type/Severity
Security Advisory: Moderate
Topic
Red Hat OpenShift Container Platform release 4136 is now available with updates to packages and images that fix several bugsThis release includes a security update for Red Hat OpenShift Container Platform 413R ...
Synopsis
Important: OpenShift Container Platform 4134 packages and security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory
View affected systems
Topic
Red Hat OpenShift Container Platform release 4134 is now available with updates to pac ...
Synopsis
Moderate: OpenShift Container Platform 4136 bug fix and security update
Type/Severity
Security Advisory: Moderate
Topic
Red Hat OpenShift Container Platform release 4136 is now available with updates to packages and images that fix several bugs and add enhancementsThis release includes a security update for Red Hat OpenShift Con ...
Synopsis
Moderate: Red Hat OpenShift Enterprise security update
Type/Severity
Security Advisory: Moderate
Topic
Red Hat OpenShift Container Platform release 41223 is now available with updates to packages and images that fix several bugs and add enhancementsThis release includes a security update for Red Hat OpenShift Container Platform 4 ...
概述
Important: OpenShift Container Platform 4135 security update
类型/严重性
Security Advisory: Important
Red Hat Insights 补丁分析
识别并修复受此公告影响的系统。
查看受影响的系统
标题
Red Hat OpenShift Container Platform release 4135 is now available with updates to packages and images that ...
Synopsis
Moderate: OpenShift Container Platform 4135 security update
Type/Severity
Security Advisory: Moderate
Topic
Red Hat OpenShift Container Platform release 4135 is now available with updates to packages and images that fix several bugs and add enhancementsThis release includes a security update for Red Hat OpenShift Container Platf ...
Synopsis
Moderate: OpenShift Container Platform 4135 security update
Type/Severity
Security Advisory: Moderate
Topic
Red Hat OpenShift Container Platform release 4135 is now available with updates to packages and images that fix several bugs and add enhancementsThis release includes a security update for Red Hat OpenShift Container Platf ...
Synopsis
Moderate: runc security update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory
View affected systems
Topic
An update for runc is now available for Red Hat Enterprise Linux 9Red Hat Product Security has rated this update as having a security ...
DescriptionThe MITRE CVE dictionary describes this issue as: runc through 114 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linuxgo To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images NOTE: this issue exist ...
runc is a CLI tool for spawning and running containers according to the OCI specification In affected versions it was found that rootless runc makes `/sys/fs/cgroup` writable in following conditons: 1 when runc is executed inside the user namespace, and the `configjson` does not specify the cgroup namespace to be unshared (eg, `(docker|podman ...
runc is a CLI tool for spawning and running containers according to the OCI specification In affected versions it was found that rootless runc makes `/sys/fs/cgroup` writable in following conditons: 1 when runc is executed inside the user namespace, and the `configjson` does not specify the cgroup namespace to be unshared (eg, `(docker|podman ...
runc is a CLI tool for spawning and running containers according to the OCI specification In affected versions it was found that rootless runc makes `/sys/fs/cgroup` writable in following conditons: 1 when runc is executed inside the user namespace, and the `configjson` does not specify the cgroup namespace to be unshared (eg, `(docker|podman ...