Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
v1.2.0
Tag: v1.2.0
Published at: 2024-10-22T09:12:21Z
URL: Release v1.2.0
Description:
This is the long-awaited release of runc 1.2.0! The primary changes from rc3
are general improvements and fixes for minor regressions related to the
new /proc/self/exe cloning logic in runc 1.2, follow-on patches related
to CVE-2024-45310, as well as some other minor changes.
(arguably somewhat unimportant, but measurable) performance overhead of
memfds for cloning
/proc/self/exe
, we have added a new protection usingoverlayfs
that is used if you have enough privileges and the runningkernel supports it. It has effectively no performance nor memory overhead
(compared to no cloning at all). (# 4448)
limited in scope to make it easier to review, however it also did not handle
all possible
os.MkdirAll
cases and thus could lead to regressions. We haveswitched to the more complete implementation in the newer versions of
github.com/cyphar/filepath-securejoin
. (# 4393, # 4400, # 4421, # 4430)could accidentally end up leaking mounts from the container into the host.
This has been fixed. (# 4417)
O_TMPFILE
clones of/proc/self/exe
had a minorbug that would cause us to miss non-
noexec
directories and thus fail toShow more
start containers on some systems. (# 4444)
/proc/self/exe
file descriptor could be placed in away that it would get clobbered by the Go runtime. We had a fix for this
already but it turns out it could still break in rare circumstances, but it
has now been fixed. (# 4294, # 4452)
runc kill
to work properly in some specificconfigurations (such as rootless containers with no cgroups and a shared pid
namespace). We now output a warning for such configurations. (# 4398)
unit more idiomatic. (# 4428)
downstreams asked for. (# 4397, # 4396)
runc init
synchronisation that was no longer necessary (dueto the
/proc/self/exe
cloning move to Go) was removed. (# 4441)Static Linking Notices
The
runc
binary distributed with this release are statically linked withthe following GNU LGPL-2.1 licensed libraries, with
runc
actingas a "work that uses the Library":
The versions of these libraries were not modified from their upstream versions,
but in order to comply with the LGPL-2.1 (§6(a)), we have attached the
complete source code for those libraries which (when combined with the attached
runc source code) may be used to exercise your rights under the LGPL-2.1.
However we strongly suggest that you make use of your distribution's packages
or download them from the authoritative upstream sources, especially since
these libraries are related to the security of your containers.
Thanks to all of the contributors who made this release possible:
Signed-off-by: Aleksa Sarai [email protected]
Commits
0b9fa21
VERSION: release v1.2.05190d61
Merge pull request # 4452 from lifubang/fix-fd-reuse-raceca45a2c
merge # 4446 into opencontainers/runc:main568231c
Revert "increase memory.max in cgroups.bats"e669926
fix an error caused by fd reuse race when starting runc init