runc security upgrade regresses docker tmpfs permission handling
Bug #2130744 reported by
Kyle Huey
This bug affects 1 person
| Affects | Status | Importance | Assigned to | Milestone | |
|---|---|---|---|---|---|
| runc (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Bug Description
Notice the permissions difference.
ubuntu@
1.3.3-0ubuntu1~
ubuntu@
total 0
drwxr-xr-x 2 root root 40 Nov 5 17:54 .
drwxr-xr-x 1 root root 12 Nov 5 17:54 ..
ubuntu@
1.3.0-0ubuntu2~
ubuntu@
total 0
drwxrwxrwt 2 root root 40 Nov 5 17:55 .
drwxr-xr-x 1 root root 12 Nov 5 17:55 ..
CVE References
| tags: | added: server-triage-discuss |
| tags: | added: regression-update |
| Changed in runc (Ubuntu): | |
| status: | Triaged → Fix Released |
To post a comment you must log in.

I luckily have an existing jammy VM with runc at version 1.3.0 and can see the same behavior
- With runc 1.3.3 , the mount option in the container is:
tmpfs on /my-tmp type tmpfs (rw,nosuid, nodev,relatime, mode=755, inode64)
- With runc 1.3.0, the mount option in the container is:
tmpfs on /my-tmp type tmpfs (rw,nosuid, nodev,relatime, inode64)