[MIR] runc

Bug #1817336 reported by Andreas Hasenack
10
This bug affects 1 person
Affects Status Importance Assigned to Milestone
runc (Ubuntu)
Fix Released
Undecided
Unassigned
runc-app (Ubuntu)
Fix Released
Undecided
Unassigned

Bug Description

[Availability]
runc is in universe (https://launchpad.net/ubuntu/+source/runc) and builds on
amd64, arm64, armhf, i386, ppc64el and s390x.

[Rationale]
This package is a requirement for the containerd MIR bug #1819761. Both packages
are necessary for OCF (Open Container Format) support, from the OCI (Open Containers Initiative, https://www.opencontainers.org/)

[Security]
runc has currently 3 CVEs:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5736
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products,
allows attackers to overwrite the host runc binary (and consequently obtain
host root access) by leveraging the ability to execute a command as root within
one of these types of containers: (1) a new container with an
attacker-controlled image, or (2) an existing container, to which the attacker
previously had write access, that can be attached with docker exec. This occurs
because of file-descriptor mishandling, related to /proc/self/exe.

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9962
RunC allowed additional container processes via 'runc exec' to be ptraced by
the pid 1 of the container. This allows the main processes of the container, if
running as root, to gain access to file-descriptors of these new processes
during the initialization and can lead to container escapes or modification of
runC state before the process is fully placed inside the container.

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3697
libcontainer/user/user.go in runC before 0.1.0, as used in Docker before
1.11.2, improperly treats a numeric UID as a potential username, which allows
local users to gain privileges via a numeric username in the password file in a
container.

There are no suid/sgid binaries, and all executables are in /usr/sbin.

There are no services or daemons in this packages (sysv, upstart or systemd).

There are no open privileged or otherwise ports.

It is used by container software like docker.

[Quality assurance]

After installing the package it must be possible to make it working with a
reasonable effort of configuration and documentation reading.
- the upstream site (https://github.com/opencontainers/runc) has a quickstart
  tutorial that boils down to this, and it works:
# create the top most bundle directory
mkdir /mycontainer
cd /mycontainer
# create the rootfs directory
mkdir rootfs
# export busybox via Docker into the rootfs directory
docker export $(docker create busybox) | tar -C rootfs -xvf -
# create a default config.json file
runc spec
# run it (no changes to config.json necessary)
runc run mycontainerid
/ # id
uid=0(root) gid=0(root)
/ # ps
PID USER TIME COMMAND
    1 root 0:00 sh
    7 root 0:00 ps

The package must not ask debconf questions higher than medium if it is going to
be installed by default. The debconf questions must have reasonable defaults.
- no debconf questions

There are no long-term outstanding bugs which affect the usability of the
program to a major degree. To support a package, we must be reasonably
convinced that upstream supports and cares for the package.
- there are currently no open bugs in Ubuntu:
  https://bugs.launchpad.net/ubuntu/+source/runc
- open bugs in debian:
  - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912821 "runc checkpoint
    failed without criu" Depending on how important the "checkpoint" feature
    is, we might have to pull in criu via a Recommends or Depends, and criu
    will require its own MIR. criu might be a problem because it seems to be
    python2, and has other deps that will need a MIR of its own. For now, we
    could add criu as a suggests.
  - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922050: security bug
    CVE-2019-5736
- upstream bugs: https://github.com/opencontainers/runc/issues (currently 159
  open, 399 closed)
- upstream pull requests: https://github.com/opencontainers/runc/pulls
  (currently 70 open, 1364 closed)

The package is maintained well in Debian/Ubuntu (check out the Debian PTS)
- debian pts for runc: https://packages.qa.debian.org/r/runc.html
- package is scheduled for removal by March 27th, 2019, because of
  CVE-2019-5736 (bug #922050) That being said, there is a new package in the
  queue which fixes that bug already (1.0.0~rc6+dfsg1-2).
- the package has DEP8 tests
- many uploads per year

The package should not deal with exotic hardware which we cannot support.
- no exotic hardware involved

If the package ships a test suite, and there is no obvious reason why it cannot
work during build (e. g. it needs root privileges or network access), it should
be run during package build, and a failing test suite should fail the build.
- tests are run at package build time. Example run, search for "dh_auto_test":
https://launchpadlibrarian.net/411349775/buildlog_ubuntu-disco-amd64.runc_1.0.0~rc6+git20181203.96ec2177-0ubuntu1_BUILDING.txt.gz
- the package also has DEP8 tests

The package uses a debian/watch file whenever possible. In cases where this is
not possible (e. g. native packages), the package should either provide a
debian/README.source file or a debian/watch file (with comments only) providing
clear instructions on how to generate the source tar file.
- there is a debian/watch file and it uses https

It is often useful to run lintian --pedantic on the package to spot the most
common packaging issues in advance
- these are the lintian issues in runc-1.0.0~rc6+git20181203.96ec2177:
$ lintian --pedantic -I --show-overrides
P: runc source: package-uses-old-debhelper-compat-version 10
I: runc source: out-of-date-standards-version 4.1.4 (released 2018-04-05) (current is 4.3.0)
I: runc source: unused-override source-contains-empty-directory vendor/*
W: golang-github-opencontainers-runc-dev: package-has-long-file-name 85 > 80
W: runc: manpage-has-bad-whatis-entry usr/share/man/man8/runc-checkpoint.8.gz
W: runc: manpage-has-bad-whatis-entry usr/share/man/man8/runc-create.8.gz
W: runc: manpage-has-bad-whatis-entry usr/share/man/man8/runc-delete.8.gz
W: runc: manpage-has-bad-whatis-entry ... use --no-tag-display-limit to see all (or pipe to a file/program)
W: runc: binary-without-manpage usr/sbin/recvtty
I: runc: unused-override spelling-error-in-binary
- the runc binary package ships one lintian override:
runc: spelling-error-in-binary

The missing manpage for recvtty could be created somewhat easily via the recvtty --help output,
which looks very much like a manpage already.

The package should not rely on obsolete or about to be demoted packages. That
currently includes package dependencies on Python2 (without providing Python3
packages), and packages depending on GTK2.
- the package has many golang build dependencies that come from Universe. The
  MIR team currently seems to have an understanding
  (https://wiki.ubuntu.com/MIRTeam#golang) that that is acceptable, but subject
  to a case-by-case analysis to avoid populating main with too many packages
  like this.
- the package gets extended funcionality if criu
  (https://launchpad.net/ubuntu/+source/criu, from universe currently), is
  installed. There is a Debian bug requesting that criu is added as a
  Recommends. That would trigger another MIR in Ubuntu, and in the meantime we
  could add that package as a Suggests. The funcionality that is added by that
  package is snapshots of containers.
- there are no python{2,3} or GTK2 dependencies
- there is a build-depends on protobuf-compiler, but that doesn't seem to
  introduce runtime dependencies related to that.

[UI standards] (generally only for user-facing applications)
- there is no internationalization support in runc. I think the most common use
  case for runc is to be consumed/used by other tools, instead of directly.
  Unless one wants to get to the lower level where runc is used, maybe for
  troubleshooting.

[Dependencies]
- currently all dependencies, including Recommends, are in main, with the note
  about golang packages from Universe that are pulled in during build and
  linked with statically. There is a Debian bug asking to add criu as a
  Recommends, already mentioned earlier, and that would break this check.
  Either we MIR criu, or add it as a suggests for the time being.

[Standards compliance]
The package should meet the FHS and Debian Policy standards. Major violations
should be documented and justified. Also, the source packaging should be
reasonably easy to understand and maintain.
- FHS compliance looks fine. The package ships just 34 files: manpages are at
  the proper location, so are binaries and /usr/share/doc files.
- debian policy is a bit less than one year old: ships with 4.1.4 (released
  2018-04-05), current one is 4.3.0
- I didn't spot major violations of the policy. I didn't check d/copyright to
  see if it's up-to-date

[Maintenance]
All packages must have a designated "owning" team, regardless of complexity,
which is set as a package bug contact.
- at some point, the Ubuntu Server manager should comment on the bug accepting
  maintenance of this package

The runc tool by itself has simple usage, but is used by more complex packages like
docker, containerd and others.

[Background information]
None at this time.

Revision history for this message
Michael Hudson-Doyle (mwhudson) wrote :

A correction: the package in disco vendors its dependencies, in the way that docker.io and snapd do, and for much the same reason: to enable backports to LTS. So there are no build-depends in universe but there is bundled source code from other projects.

This means that (again in disco for now, but soon to be all stable releases) while the Debian and Ubuntu packaging share a common history, they are no longer in sync and are unlikely to be again, so in that sense the quality of maintenance in Debian is not super relevant to this MIR (unless we maintain the vendoring changes by rebasing on top of Debian; I'm not sure if that would be a good idea or not at this point).

Revision history for this message
Andreas Hasenack (ahasenack) wrote :

You mean this?
ubuntu@disco-mir:~/deb/runc-1.0.0~rc6+git20181203.96ec2177$ cat vendor.conf
# OCI runtime-spec. When updating this, make sure you use a version tag rather
# than a commit ID so it's much more obvious what version of the spec we are
# using.
github.com/opencontainers/runtime-spec 5684b8af48c1ac3b1451fa499724e30e3c20a294
# Core libcontainer functionality.
github.com/mrunalp/fileutils ed869b029674c0e9ce4c0dfa781405c2d9946d08
github.com/opencontainers/selinux v1.0.0-rc1
github.com/seccomp/libseccomp-golang 84e90a91acea0f4e51e62bc1a75de18b1fc0790f
github.com/sirupsen/logrus a3f95b5c423586578a4e099b11a46c2479628cac
github.com/syndtr/gocapability db04d3cc01c8b54962a58ec7e491717d06cfcc16
github.com/vishvananda/netlink 1e2e08e8a2dcdacaae3f14ac44c5cfa31361f270
# systemd integration.
github.com/coreos/go-systemd v14
github.com/coreos/pkg v3
github.com/godbus/dbus v3
github.com/golang/protobuf 18c9bb3261723cd5401db4d0c9fbc5c3b6c70fe8
# Command-line interface.
github.com/cyphar/filepath-securejoin v0.2.1
github.com/docker/go-units v0.2.0
github.com/urfave/cli d53eb991652b1d438abdd34ce4bfa3ef1539108e
golang.org/x/sys 7ddbeae9ae08c6a06a59597f0c9edbc5ff2444ce https://github.com/golang/sys

# console dependencies
github.com/containerd/console 2748ece16665b45a47f884001d5831ec79703880
github.com/pkg/errors v0.8.0

description: updated
description: updated
Changed in runc (Ubuntu):
assignee: nobody → Mathieu Trudel-Lapierre (cyphermox)
Revision history for this message
Mathieu Trudel-Lapierre (cyphermox) wrote :

In general vendored depends are "okay" in that they are a known issue that we generally need to deal with, even if it should be avoided whenever possible.

Blockers:
- There is still no team subscriber for the package; ubuntu-server isn't subscribed.
- Three open CVE that need fixing in disco; should get an explicit ack by Security that it's maintainable / manageable for them considering both the vendoring and the currently open CVEs / CVE history.

This should also see a proper code review by the Security Team. I see various potentially sensitive points in the package, which is in line with container management stuff: dealing with signals, namespaces, cache management?

It also appears as this was previously maintained by Michael / Foundations; it should be clarified exactly who should own the maintenance of this package (is it Foundations or Server?)

Reassigning to Ubuntu Security for review.

Changed in runc (Ubuntu):
assignee: Mathieu Trudel-Lapierre (cyphermox) → Ubuntu Security Team (ubuntu-security)
Revision history for this message
Joshua Powers (powersj) wrote :

ubuntu-server is now subscribed to bugs

Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

Last open CVE fixed as of 1.0.0~rc6+git20181203.96ec2177-0~ubuntu2 backports are in all releases.
So past CVEs are no more part of the discussion.

Subscription already done for the server Team - thanks Josh.

This is in the security Teams review queue (which is the proper next step).

I wanted to summarize after the discussion about Go-vendoring at the recent sprint:

- we expect (as in Docker) to handle runc/containerd special for SRUs providing an upstream experience which means regular MRE updates.

- due to that over time we will have to move the GO dependencies forward which we can't for de-vendorized packages

- Therefore it was agreed that we will do an initial check if a few could be used de-vendorized that are already done (e.g. due to former LXD activities) but not de-vendorize/MIR new packages.

- We will provide a list of used vendorized code and tags/commits of it to security for their tracking for alerts

- Going forward on updates we will check if some of them will then have to switch from de-vendorized to vendorized code. In that case we will keep security updated with the new list of vendored code for their tracking for alerts.

-- TODOs (other than the ongoing security review) ---

@Andreas will at some point do a check which (of the many) dependencies could (right now) be used from pre-de-vendorized packages - security had a particular interest in golang-golang-x-crypto-dev which was already in main for Juju (bug 1267393) but no more has a dep holding it in at the moment. A bunch more are in bug 1711317 bug 1520679 bug 1711265

Revision history for this message
Lucas Kanashiro (lucaskanashiro) wrote :
Download full text (11.0 KiB)

I've been investigating the vendorized dependencies in runc and below you can find my notes so far:

# RunC - vendorized dependencies

## Summary:

- Total of 17 vendorized deps
    + None of them has a correspondent package in main
- 1 vendorized deps without correspondent package in the archive
- 5 vendorized deps match version with packages in universe
- 3 vendorized deps with version greater than the correspondent package in
  universe
    + Those packages might need update
- 8 vendorized deps with version lower than the correspondent package in
  universe

## Build information about Go executables

The runc package (1.0.0~rc8+git20190923.3e425f80) was rebuilt (go build -tags
"seccomp") with Go 1.13 and the command bellow was executed to get information
about embedded modules of each executable:

~/go/src/github.com/opencontainers/runc$ go version -m ./runc
./runc: go1.13.4
 path github.com/opencontainers/runc
 mod github.com/opencontainers/runc (devel)
 dep github.com/checkpoint-restore/go-criu v0.0.0-20181120144056-17b0214f6c48 h1:AQMF0Xixllgf29MKlx/TGEhRk7bEDX5kxz8Ui8lOvEs=
 dep github.com/containerd/console v0.0.0-20181022165439-0650fd9eeb50 h1:WMpHmC6AxwWb9hMqhudkqG7A/p14KiMnl6d3r1iUMjU=
 dep github.com/coreos/go-systemd v0.0.0-20190321100706-95778dfbb74e h1:Wf6HqHfScWJN9/ZjdUKyjop4mf3Qdd+1TvvltAvM3m8=
 dep github.com/cyphar/filepath-securejoin v0.2.2 h1:jCwT2GTP+PY5nBz3c/YL5PAIbusElVrPujOBSCj8xRg=
 dep github.com/docker/go-units v0.3.3 h1:Xk8S3Xj5sLGlG5g67hJmYMmUgXv5N4PhkjJHHqrwnTk=
 dep github.com/godbus/dbus v0.0.0-20181101234600-2ff6f7ffd60f h1:zlOR3rOlPAVvtfuxGKoghCmop5B0TRyu/ZieziZuGiM=
 dep github.com/golang/protobuf v1.0.0 h1:lsek0oXi8iFE9L+EXARyHIjU5rlWIhhTkjDz3vHhWWQ=
 dep github.com/mrunalp/fileutils v0.0.0-20171103030105-7d4729fb3618 h1:7InQ7/zrOh6SlFjaXFubv0xX0HsuC9qJsdqm7bNQpYM=
 dep github.com/opencontainers/runtime-spec v1.0.2-0.20190207185410-29686dbc5559 h1:Cef96rKLuXxeGzERI/0ve9yAzIeTpx0qz9JKFDZALYw=
 dep github.com/opencontainers/selinux v1.2.2 h1:Kx9J6eDG5/24A6DtUquGSpJQ+m2MUTahn4FtGEe8bFg=
 dep github.com/pkg/errors v0.8.1 h1:iURUrRGxPUNPdy5/HRSm+Yj6okJ6UtLINN0Q9M4+h3I=
 dep github.com/seccomp/libseccomp-golang v0.9.1 h1:NJjM5DNFOs0s3kYE1WUOr6G8V97sdt46rlXTMfXGWBo=
 dep github.com/sirupsen/logrus v1.4.1 h1:GL2rEmy6nsikmW0r8opw9JIRScdMF5hA8cOYLH7In1k=
 dep github.com/syndtr/gocapability v0.0.0-20180916011248-d98352740cb2 h1:b6uOv7YOFK0TYG7HtkIgExQo+2RdLuwRft63jn2HWj8=
 dep github.com/urfave/cli v1.20.0 h1:fDqGv3UG/4jbVl/QkFwEdddtEDjh/5Ov6X+0B/3bPaw=
 dep github.com/vishvananda/netlink v0.0.0-20150820014904-1e2e08e8a2dc h1:0HAHLwEY4k1VqaO1SzBi4XxT0KA06Cv+QW2LXknBk9g=
 dep golang.org/x/sys v0.0.0-20190812073006-9eafafc0a87e h1:TsjK5I7fXk8f2FQrgu6NS7i5Qih3knl2FL1htyguLRE=

~/go/src/github.com/opencontainers/runc/contrib/cmd/recvtty$ go version -m ./recvtty
./recvtty: go1.13.4
 path github.com/opencontainers/runc/contrib/cmd/recvtty
 mod github.com/opencontainers/runc (devel)
 dep github.com/containerd/console v0.0.0-20181022165439-0650fd9eeb50 h1:WMpHmC6AxwWb9hMqhudkqG7A/p14KiMnl6d3r1iUMjU=
 dep github.com/urfave/cli v1.20.0 h1:fDqGv3UG/4jbVl/QkFwEdddtEDjh/5Ov6X+0B/3bPaw=
 dep golang.org/x/sys v0.0.0-201908120730...

description: updated
Revision history for this message
Andreas Hasenack (ahasenack) wrote :

According to the report from comment #6, of the 17 vendorized packages runc uses, 16 exist as debs in universe, and 1 (go-criu) isn't packaged at all.

We can de-vendorize the 16 packages, assuming the versions we have in universe are ok (some are ahead of the vendored code, some are behind). Lucas has a branch for this, where runc has build-depends on those 16 packages. The resulting deb gets a Built-Using entry:

$ dpkg --info ../runc_1.0.0~rc8+git20190923.3e425f80+ds1-0ubuntu1_amd64.deb |grep Built-Using
 Built-Using: go-md2man (= 1.0.10+ds-1), golang-1.13 (= 1.13.5-1ubuntu1), golang-blackfriday (= 1.5.2+git20190616.a925a15-1), golang-dbus (= 5.0.3-1), golang-github-containerd-console (= 0.0~git20170925.84eeaae-1), golang-github-coreos-go-systemd (= 22.0.0-1), golang-github-cyphar-filepath-securejoin (= 0.2.2-1), golang-github-docker-go-units (= 0.4.0-3), golang-github-mrunalp-fileutils (= 0.0~git20160930.0.4ee1cc9-1), golang-github-opencontainers-selinux (= 1.3.0-2), golang-github-opencontainers-specs (= 1.0.1+git20190408.a1b50f6-1), golang-github-pkg-errors (= 0.8.1-1), golang-github-urfave-cli (= 1.22.2-1), golang-github-vishvananda-netlink (= 1.0.0+git20181030.023a6da-1), golang-github-vishvananda-netns (= 0.0~git20170707.0.86bef33-1), golang-go.crypto (= 1:0.0~git20190701.4def268-2), golang-gocapability-dev (= 0.0+git20180916.d983527-1), golang-golang-x-sys (= 0.0~git20190726.fc99dfb-1ubuntu2), golang-goprotobuf (= 1.3.2-2), golang-logrus (= 1.3.0-1)

> - Therefore it was agreed that we will do an initial check if a few could be used
> de-vendorized that are already done (e.g. due to former LXD activities) but not
> de-vendorize/MIR new packages.

So, since none of the packages that runc build-depends on have been MIRed before, do we keep the runc package as is and proceed with the security review with the vendored code?

Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

Yes, if all vendorized deps that are packaged are not in main either there is no gain by de-vendorizing them right now for this case.

To be clear, they usually would be good to be de-vendored - but as discussed before runc (and containerd) are special in that you already plan to regularly update them to the latest version via an SRU exception. That way you'd always have very painful SRUs dropping/adding these deps over and over as dependencies cahnge.

Never the less I'd want to bring that to discussion in the MIR Team meeting to be sure and on one page with all other team members.

Revision history for this message
Eduardo Barretto (ebarretto) wrote :
Download full text (3.7 KiB)

I reviewed runc 1.0.0~rc8+git20190923.3e425f80-0ubuntu1 as checked into focal.
This shouldn't be considered a full audit but rather a quick gauge of
maintainability.

runc, a lightweight universal container runtime, is a CLI tool for spawning and
running containers according to the Open Container Initiative (OCI) specification.

The runc .deb package contains lots of vendored code. This was already discussed
in the previous comments.

- CVE History:
  - CVE-2019-19921 - Race condition on volume mounting. Not fixed yet in upstream.
  - CVE-2019-16884 - Apparmor bypass. Currently fixed in eoan and focal.
  - CVE-2019-5736 - mishandling of file-descriptor, related to /proc/self/exe,
    may allow attacker to obtain host root access. Fixed in all active releases.
  - CVE-2016-9962 - privilege escalation allowed when opening a file-descriptor.
    Fixed in all active releases.
  - CVE-2016-3697 - privilege escalation because of improperly handling of
    usernames. Fixed in all active releases.
- Build-Depends
  - debhelper,
  - dh-golang,
  - go-md2man,
  - golang-any,
  - libapparmor-dev,
  - libseccomp-dev,
  - pkg-config,
  - protobuf-compiler
- No pre/post inst/rm scripts
- No init scripts
- No systemd units
- No dbus services
- No setuid binaries
- binaries in PATH
  - /usr/sbin/recvtty - recvtty is a reference implementation of a consumer of
    runC's --console-socket API.
  - /usr/sbin/runc - the command-line client for running containers.
- No sudo fragments
- No udev rules
- unit tests / autopkgtests
  - unit tests can be found under libcontainer/ and they test multiple
    functionalities of the code. They make use of Go's unit test framework.
    Unit tests are run during the package build.
  - Integrations tests provide end-to-end testing of runc, they can be found
    under tests/ and under libcontainer/.
- No cron jobs
- Build logs:
  - No build errors
  - No meaningful lintian failures

- Processes spawned
  - libcontainer/nsenter/nsexec.c:276: execve(app, argv, envp);
    It try to call /proc/<pid>/uid_map or /pro/<pid>/gid_map
    Apparently the pid is retrieved from the environment variable
    _LIBCONTAINER_INITPIPE, "which was opened by the parent and kept open across
    the fork-exec of the `nsexec()` init"
  - libcontainer/nsenter/cloned_binary.c:512: fexecve(execfd, argv, environ);
    Looks like it calls /proc/self/exe
- Memory management
  - A few .c file doing memory management, seems ok.
  - and a vendored secccomp code in golang doing a calloc.
- File IO
  - A few file IO in the C code of libcontainer, looks ok.
- Logging
  - make use of the errors package in some places.
  - but mostly uses logrus (vendored code)
- Environment variable usage
  - _LIBCONTAINER_INITPIPE
  - CLONED_BINARY_ENV
  - _LIBCONTAINER_STATEDIR
- Use of privileged functions
  - Seth took a look on those and the only relevant finding was reported here:
    https://github.com/opencontainers/runc/issues/2214
  - Nothing troublesome.
- Use of cryptography / random number sources:
  - Vendored godbus has a sha1 auth implementation.
- Use of temp files
  - Some tests make use of /tmp and libcontainer uses /tmp when it wants to
    mount rootfs on...

Read more...

Changed in runc (Ubuntu):
assignee: Ubuntu Security Team (ubuntu-security) → nobody
Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

This is ready to go on, just FYI this is a few more days on hold as we want to move this at once together with containerd (bug 1819761).

Changed in runc (Ubuntu):
status: New → In Progress
Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

containerd (bug 1819761) is now ready for promotion as well.
We need to make a seed change to pull them in.

Revision history for this message
Christian Ehrhardt  (paelzer) wrote :
Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

Seed change approved and done, since this only is going to the supported seed but not getting a direct package/task dependency please help to let us later double check it actually shows up in component mismatches.

Changed in runc (Ubuntu):
status: In Progress → Fix Committed
Revision history for this message
Steve Langasek (vorlon) wrote :

Override component to main
runc 1.0.0~rc10-0ubuntu1 in focal: universe/misc -> main
golang-github-opencontainers-runc-dev 1.0.0~rc10-0ubuntu1 in focal amd64: universe/devel/extra/100% -> main
golang-github-opencontainers-runc-dev 1.0.0~rc10-0ubuntu1 in focal arm64: universe/devel/extra/100% -> main
golang-github-opencontainers-runc-dev 1.0.0~rc10-0ubuntu1 in focal armhf: universe/devel/extra/100% -> main
golang-github-opencontainers-runc-dev 1.0.0~rc10-0ubuntu1 in focal i386: universe/devel/extra/100% -> main
golang-github-opencontainers-runc-dev 1.0.0~rc10-0ubuntu1 in focal ppc64el: universe/devel/extra/100% -> main
golang-github-opencontainers-runc-dev 1.0.0~rc10-0ubuntu1 in focal s390x: universe/devel/extra/100% -> main
runc 1.0.0~rc10-0ubuntu1 in focal amd64: universe/devel/extra/100% -> main
runc 1.0.0~rc10-0ubuntu1 in focal arm64: universe/devel/extra/100% -> main
runc 1.0.0~rc10-0ubuntu1 in focal armhf: universe/devel/extra/100% -> main
runc 1.0.0~rc10-0ubuntu1 in focal ppc64el: universe/devel/extra/100% -> main
runc 1.0.0~rc10-0ubuntu1 in focal s390x: universe/devel/extra/100% -> main
12 publications overridden.

Changed in runc (Ubuntu):
status: Fix Committed → Fix Released
Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

IMHO worth mentioning here, as a consequence of bug 2022390 this source has been split.
The old source stays in sync with Debian providing the reverse dependencies the stability within the archive. And then there is the -app suffix which provides the regular updates (without impact to reverse dependencies) of the application stack.

Changed in runc-app (Ubuntu):
status: New → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.