runc-1.1.12-2.el9

エラータID: AXSA:2024-7794:03

Release date: 
Wednesday, May 29, 2024 - 20:23
Subject: 
runc-1.1.12-2.el9
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
Moderate
Description: 

The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.

Security Fix(es):

* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. (CVE-2023-45287)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the MIRACLE LINUX 9.4 Release Notes linked from the References section.

CVE-2022-30630
Uncontrolled recursion in Glob in io/fs before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a path which contains a large number of path separators.
CVE-2022-30631
Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files.
CVE-2022-30632
Uncontrolled recursion in Glob in path/filepath before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a path containing a large number of path separators.
CVE-2023-45287
Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. runc-1.1.12-2.el9.src.rpm
    MD5: 8bb61a86bdcea676db87a03d02ee48f2
    SHA-256: 4e8ffbf6a13ba956088495617c7ef6aa30bf14eb7fcd187e6deb7788d643c09f
    Size: 2.38 MB

Asianux Server 9 for x86_64
  1. runc-1.1.12-2.el9.x86_64.rpm
    MD5: cf034876523caaa94a2a5e1229537881
    SHA-256: dba0d4f2e091b11167b6e12a1eda9c0ba7b89de359527a1b58d18bc5dbedb87e
    Size: 3.12 MB