You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+36-1Lines changed: 36 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,6 +6,40 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
6
6
7
7
## [Unreleased 1.2.z]
8
8
9
+
## [1.2.8] - 2025-11-05
10
+
11
+
> 鳥籠の中に囚われた屈辱を
12
+
13
+
### Security
14
+
15
+
This release includes fixes for the following high-severity security issues:
16
+
17
+
*[CVE-2025-31133][] exploits an issue with how masked paths are implemented in
18
+
runc. When masking files, runc will bind-mount the container's `/dev/null`
19
+
inode on top of the file. However, if an attacker can replace `/dev/null`
20
+
with a symlink to some other procfs file, runc will instead bind-mount the
21
+
symlink target read-write. This issue affected all known runc versions.
22
+
23
+
*[CVE-2025-52565][] is very similar in concept and application to
24
+
[CVE-2025-31133][], except that it exploits a flaw in `/dev/console`
25
+
bind-mounts. When creating the `/dev/console` bind-mount (to `/dev/pts/$n`),
26
+
if an attacker replaces `/dev/pts/$n` with a symlink then runc will
27
+
bind-mount the symlink target over `/dev/console`. This issue affected all
28
+
versions of runc >= 1.0.0-rc3.
29
+
30
+
*[CVE-2025-52881][] is a more sophisticated variant of [CVE-2019-19921][],
31
+
which was a flaw that allowed an attacker to trick runc into writing the LSM
32
+
process labels for a container process into a dummy tmpfs file and thus not
33
+
apply the correct LSM labels to the container process. The mitigation we
34
+
applied for [CVE-2019-19921][] was fairly limited and effectively only caused
35
+
runc to verify that when we write LSM labels that those labels are actual
36
+
procfs files. This issue affects all known runc versions.
0 commit comments