Description: "runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory."
@ maintainer(s): Please cleanup and drop =app-emulation/runc-1.0.0_rc8!
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=2f21e4f1e09cb1c957781841a6ff90dae3494025 commit 2f21e4f1e09cb1c957781841a6ff90dae3494025 Author: William Hubbs <williamh@gentoo.org> AuthorDate: 2020-03-14 22:51:41 +0000 Commit: William Hubbs <williamh@gentoo.org> CommitDate: 2020-03-14 22:51:41 +0000 app-emulation/runc: remove vulnerable versions Bug: https://bugs.gentoo.org/709456 Bug: https://bugs.gentoo.org/711182 Signed-off-by: William Hubbs <williamh@gentoo.org> app-emulation/runc/runc-1.0.0_rc8.ebuild | 63 -------------------------------- app-emulation/runc/runc-1.0.0_rc9.ebuild | 63 -------------------------------- 2 files changed, 126 deletions(-)
Added to an existing GLSA.
This issue was resolved and addressed in GLSA 202003-21 at https://security.gentoo.org/glsa/202003-21 by GLSA coordinator Thomas Deutschmann (whissi).