Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2024:0756 - Security Advisory
Issued:
2024-02-08
Updated:
2024-02-08

RHSA-2024:0756 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: runc security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for runc is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The runC tool is a lightweight, portable implementation of the Open Container Format (OCF) that provides container runtime.

Security Fix(es):

  • runc: file descriptor leak (CVE-2024-21626)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0 ppc64le
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
  • Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0 aarch64
  • Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0 s390x

Fixes

  • BZ - 2258725 - CVE-2024-21626 runc: file descriptor leak

CVEs

  • CVE-2024-21626

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/security/vulnerabilities/RHSB-2024-001
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0

SRPM
runc-1.1.12-1.el9_0.src.rpm SHA-256: 217ee1a4c42be86420dd183139eb179813efe8afdb7f5fb69dc6b4190b5973ad
x86_64
runc-1.1.12-1.el9_0.x86_64.rpm SHA-256: 29bfcb502d3f01f8dde09ce4092128756c066882f7303261e139fd516cb464bb
runc-debuginfo-1.1.12-1.el9_0.x86_64.rpm SHA-256: 533ffcc017cae2cd5bf59ab4e9f2d3060eb014152761e01d973d3eaa7571ecf9
runc-debugsource-1.1.12-1.el9_0.x86_64.rpm SHA-256: 30281491137239830a69d15ddd3c7ad9364b25de8c9a48adfdbb52414e037331

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0

SRPM
runc-1.1.12-1.el9_0.src.rpm SHA-256: 217ee1a4c42be86420dd183139eb179813efe8afdb7f5fb69dc6b4190b5973ad
s390x
runc-1.1.12-1.el9_0.s390x.rpm SHA-256: 280c7b162fdef363725cfac5db5fb017c02b883fac406ddd7b5b60f59f5f339d
runc-debuginfo-1.1.12-1.el9_0.s390x.rpm SHA-256: 419260d86871a2d0bbf4a6bebc159a78ab0724293e75ca273429d960f93c135e
runc-debugsource-1.1.12-1.el9_0.s390x.rpm SHA-256: d6998315f922211e373710b97da92b619f8ef6cf7aef53cfea0e78736e2ea36c

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0

SRPM
runc-1.1.12-1.el9_0.src.rpm SHA-256: 217ee1a4c42be86420dd183139eb179813efe8afdb7f5fb69dc6b4190b5973ad
ppc64le
runc-1.1.12-1.el9_0.ppc64le.rpm SHA-256: 9e1f1b58bb4f0307cc7f76fe2809f8b4f6551beffbf621629b55c55fd6aa768e
runc-debuginfo-1.1.12-1.el9_0.ppc64le.rpm SHA-256: 22d3b5faccdbd45b9f6f2f0de10f3e656fa26168ace046b4f20ceb5dd2733d42
runc-debugsource-1.1.12-1.el9_0.ppc64le.rpm SHA-256: c7823c39cd87303454b248af5932119cbd6d5779f7cdf7ec986b7bf11dc5b77e

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0

SRPM
runc-1.1.12-1.el9_0.src.rpm SHA-256: 217ee1a4c42be86420dd183139eb179813efe8afdb7f5fb69dc6b4190b5973ad
aarch64
runc-1.1.12-1.el9_0.aarch64.rpm SHA-256: c495a126b9f3b9c8e9f1eb1d3a442f2ae4253263beee65c533d098c3c40662dc
runc-debuginfo-1.1.12-1.el9_0.aarch64.rpm SHA-256: cb282dc663291b4560d8340c233b8616113a3d3bc125498eb61bdff30414e125
runc-debugsource-1.1.12-1.el9_0.aarch64.rpm SHA-256: 891a9185ef1b0d735401dc4d512b529e6250f0c4aaffc79d51a61efaff989916

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0

SRPM
runc-1.1.12-1.el9_0.src.rpm SHA-256: 217ee1a4c42be86420dd183139eb179813efe8afdb7f5fb69dc6b4190b5973ad
ppc64le
runc-1.1.12-1.el9_0.ppc64le.rpm SHA-256: 9e1f1b58bb4f0307cc7f76fe2809f8b4f6551beffbf621629b55c55fd6aa768e
runc-debuginfo-1.1.12-1.el9_0.ppc64le.rpm SHA-256: 22d3b5faccdbd45b9f6f2f0de10f3e656fa26168ace046b4f20ceb5dd2733d42
runc-debugsource-1.1.12-1.el9_0.ppc64le.rpm SHA-256: c7823c39cd87303454b248af5932119cbd6d5779f7cdf7ec986b7bf11dc5b77e

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0

SRPM
runc-1.1.12-1.el9_0.src.rpm SHA-256: 217ee1a4c42be86420dd183139eb179813efe8afdb7f5fb69dc6b4190b5973ad
x86_64
runc-1.1.12-1.el9_0.x86_64.rpm SHA-256: 29bfcb502d3f01f8dde09ce4092128756c066882f7303261e139fd516cb464bb
runc-debuginfo-1.1.12-1.el9_0.x86_64.rpm SHA-256: 533ffcc017cae2cd5bf59ab4e9f2d3060eb014152761e01d973d3eaa7571ecf9
runc-debugsource-1.1.12-1.el9_0.x86_64.rpm SHA-256: 30281491137239830a69d15ddd3c7ad9364b25de8c9a48adfdbb52414e037331

Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0

SRPM
runc-1.1.12-1.el9_0.src.rpm SHA-256: 217ee1a4c42be86420dd183139eb179813efe8afdb7f5fb69dc6b4190b5973ad
aarch64
runc-1.1.12-1.el9_0.aarch64.rpm SHA-256: c495a126b9f3b9c8e9f1eb1d3a442f2ae4253263beee65c533d098c3c40662dc
runc-debuginfo-1.1.12-1.el9_0.aarch64.rpm SHA-256: cb282dc663291b4560d8340c233b8616113a3d3bc125498eb61bdff30414e125
runc-debugsource-1.1.12-1.el9_0.aarch64.rpm SHA-256: 891a9185ef1b0d735401dc4d512b529e6250f0c4aaffc79d51a61efaff989916

Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0

SRPM
runc-1.1.12-1.el9_0.src.rpm SHA-256: 217ee1a4c42be86420dd183139eb179813efe8afdb7f5fb69dc6b4190b5973ad
s390x
runc-1.1.12-1.el9_0.s390x.rpm SHA-256: 280c7b162fdef363725cfac5db5fb017c02b883fac406ddd7b5b60f59f5f339d
runc-debuginfo-1.1.12-1.el9_0.s390x.rpm SHA-256: 419260d86871a2d0bbf4a6bebc159a78ab0724293e75ca273429d960f93c135e
runc-debugsource-1.1.12-1.el9_0.s390x.rpm SHA-256: d6998315f922211e373710b97da92b619f8ef6cf7aef53cfea0e78736e2ea36c

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility