[pkg-go] Bug#853866: unblock: runc/0.1.1+dfsg1-2

Tianon Gravi tianon at debian.org
Wed Feb 1 16:12:19 UTC 2017


Package: release.debian.org
Severity: normal
User: release.debian.org at packages.debian.org
Usertags: unblock

Please unblock package runc

There was a CVE filed against runc recently (CVE-2016-9962), and the
patch to fix it was applied in the 0.1.1+dfsg1-2 team upload I just
made.  The patch is simply setting "runc exec" processes as
"non-dumpable" (which according to the CVE text and upstream, closes the
vulnerability).

unblock runc/0.1.1+dfsg1-2

-- System Information:
Debian Release: 9.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.9.0-1-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
-------------- next part --------------
diff -Nru runc-0.1.1+dfsg1/debian/changelog runc-0.1.1+dfsg1/debian/changelog
--- runc-0.1.1+dfsg1/debian/changelog	2016-07-13 06:01:04.000000000 -0700
+++ runc-0.1.1+dfsg1/debian/changelog	2017-02-01 07:17:54.000000000 -0800
@@ -1,3 +1,10 @@
+runc (0.1.1+dfsg1-2) unstable; urgency=medium
+
+  * Team upload.
+  * Backport patch for CVE-2016-9962 (Closes: #850951)
+
+ -- Tianon Gravi <tianon at debian.org>  Wed, 01 Feb 2017 07:17:54 -0800
+
 runc (0.1.1+dfsg1-1) unstable; urgency=medium
 
   * New upstream release [June 2016].
diff -Nru runc-0.1.1+dfsg1/debian/control runc-0.1.1+dfsg1/debian/control
--- runc-0.1.1+dfsg1/debian/control	2016-07-13 05:58:01.000000000 -0700
+++ runc-0.1.1+dfsg1/debian/control	2016-11-29 14:18:25.000000000 -0800
@@ -3,7 +3,8 @@
 Priority: extra
 Maintainer: Debian Go Packaging Team <pkg-go-maintainers at lists.alioth.debian.org>
 Uploaders: Alexandre Viau <alexandre at alexandreviau.net>,
-           Dmitry Smirnov <onlyjob at debian.org>
+           Dmitry Smirnov <onlyjob at debian.org>,
+           Tim Potter <tpot at hpe.com>
 Build-Depends: debhelper (>= 9),
                dh-golang,
     go-md2man,
diff -Nru runc-0.1.1+dfsg1/debian/patches/cve-2016-9962.patch runc-0.1.1+dfsg1/debian/patches/cve-2016-9962.patch
--- runc-0.1.1+dfsg1/debian/patches/cve-2016-9962.patch	1969-12-31 16:00:00.000000000 -0800
+++ runc-0.1.1+dfsg1/debian/patches/cve-2016-9962.patch	2017-01-31 20:50:59.000000000 -0800
@@ -0,0 +1,23 @@
+Description: set "runc exec" processes as non-dumpable (CVE-2016-9962)
+Origin: https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5 (backported to v0.1.1)
+Author: Tianon Gravi <tianon at debian.org>
+Forwarded: not-needed
+Applied-Upstream: > 1.0.0-rc2
+
+diff --git a/libcontainer/nsenter/nsexec.c b/libcontainer/nsenter/nsexec.c
+index 8f37d6c..3c74c63 100644
+--- a/libcontainer/nsenter/nsexec.c
++++ b/libcontainer/nsenter/nsexec.c
+@@ -364,6 +364,12 @@ void nsexec(void)
+ 		return;
+ 	}
+ 
++	/* make the process non-dumpable */
++	if (prctl(PR_SET_DUMPABLE, 0, 0, 0, 0) != 0) {
++		pr_perror("Failed to set process as non-dumpable");
++		exit(1);
++	}
++
+ 	// Retrieve the netlink header
+ 	struct nlmsghdr nl_msg_hdr;
+ 	int		len;
diff -Nru runc-0.1.1+dfsg1/debian/patches/series runc-0.1.1+dfsg1/debian/patches/series
--- runc-0.1.1+dfsg1/debian/patches/series	2016-07-13 05:08:22.000000000 -0700
+++ runc-0.1.1+dfsg1/debian/patches/series	2017-01-31 20:48:05.000000000 -0800
@@ -1 +1,2 @@
 disable-failing-tests.patch
+cve-2016-9962.patch


More information about the Pkg-go-maintainers mailing list