[ubuntu/groovy-security] containerd 1.5.2-0ubuntu1~20.10.2 (Accepted)
Marc Deslauriers
marc.deslauriers at canonical.com
Tue Jul 20 10:46:59 UTC 2021
containerd (1.5.2-0ubuntu1~20.10.2) groovy-security; urgency=medium
* SECURITY UPDATE: unexpected host file permission changes
- debian/patches/1.5-Cleanup-lchmod-logic-in-archive.patch: cleanup
lchmod logic in archive in archive/tar.go, archive/tar_freebsd.go,
archive/tar_mostunix.go, archive/tar_test.go, archive/tar_unix.go,
archive/tar_windows.go.
- No CVE number yet
containerd (1.5.2-0ubuntu1~20.10.1) groovy; urgency=medium
* New upstream release, backport from Impish (LP: #1931464).
* d/p/skip-tests-with-privilege.patch: add a patch to skip tests which
require a certain level of privilege not achievable in the build
environment.
containerd (1.4.4-0ubuntu1~20.10.1) groovy; urgency=medium
* Backport version 1.4.4-0ubuntu1 from Hirsute (LP: #1919322).
- d/control: update Breaks docker.io version to match version in Groovy.
containerd (1.4.4-0ubuntu1) hirsute; urgency=medium
* New upstream release.
- It contains a fix for CVE-2021-21334 along with various other minor
issues.
* Refresh preserve-debug-info.patch
* d/rules: set GO111MODULE to auto. In Go 1.16, which is the default in
Hirsute now, the packages are built in module-aware mode. Since containerd
does not have a go.mod file in its source tree it FTBFS. Setting GO111MODULE
to auto we can have the previous behavior which is enable module-aware mode
only if the go.mod file exists.
containerd (1.4.3-0ubuntu1) hirsute; urgency=medium
* New upstream release.
* Drop patches applied by upstream.
- d/p/4134-update-etcd-bbolt.patch
- d/p/4277-fix-build-on-riscv64.patch
- d/p/e859b8a-gc-increase-sleep-time-in-test.patch
- d/p/CVE-2020-15257.patch
* Update the copyright file.
* Build depend on default Golang version in all architectures.
containerd (1.3.7-0ubuntu5) hirsute; urgency=medium
* d/control: add a Breaks for docker.io lower than 19.03.13-0ubuntu4.
See LP #1870514. The previous versions stop the docker daemon when a
containerd update is performed, this Breaks statement will make sure we
have a newer version which has the appropriate fix.
containerd (1.3.7-0ubuntu4) hirsute; urgency=medium
* SECURITY UPDATE: Elevation of privilege vulnerability
- debian/patches/CVE-2020-15257.patch: Use path based unix socket for shims
and use path-based unix socket for containerd-shim.
- CVE-2020-15257
Date: 2021-07-13 17:52:09.671713+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/containerd/1.5.2-0ubuntu1~20.10.2
-------------- next part --------------
Sorry, changesfile not available.
More information about the Groovy-changes
mailing list