"A bug was found in runc where runc exec --cap executed processes with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set." Please bump to 1.1.2.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=6d09b48976e555e3a183f73dd59748b6e6092bca commit 6d09b48976e555e3a183f73dd59748b6e6092bca Author: William Hubbs <williamh@gentoo.org> AuthorDate: 2022-05-14 02:29:31 +0000 Commit: William Hubbs <williamh@gentoo.org> CommitDate: 2022-05-14 02:29:56 +0000 app-containers/runc: add 1.1.2 Bug: https://bugs.gentoo.org/844085 Signed-off-by: William Hubbs <williamh@gentoo.org> app-containers/runc/Manifest | 1 + app-containers/runc/runc-1.1.2.ebuild | 78 +++++++++++++++++++++++++++++++++++ 2 files changed, 79 insertions(+)
Thanks! Please stable when ready
Seems I typo'd the CVE.