New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[release/1.2] Prepare v1.2.11 release #3811
Conversation
Generated notes; containerd 1.2.11 Welcome to the v1.2.11 release of containerd! The eleventh patch release for Notable Updates
Please try out the release binaries and report any issues at Contributors
Changes
Changes from containerd/cri
Dependency ChangesPrevious release can be found at v1.2.10
|
hm, looks like GitHub Flavored markdown makes the line-wrapping a bit awkward; let me remove some newlines in the description |
8c92951
to
7b9f27e
Compare
Codecov Report
@@ Coverage Diff @@
## release/1.2 #3811 +/- ##
============================================
Coverage 44.19% 44.19%
============================================
Files 100 100
Lines 10847 10847
============================================
Hits 4794 4794
Misses 5313 5313
Partials 740 740
Continue to review full report at Codecov.
|
note that the Go 1.12.13 bump wasn't merged yet, but I anticipated it to be merged before a release is done 🤗 |
one more ticket for #3821. Thanks! |
7b9f27e
to
a09f6c0
Compare
* Update the runc vendor to v1.0.0-rc9 which includes an additional mitigation for [CVE-2019-16884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16884). - More details on the runc CVE in [opencontainers/runc#2128](opencontainers/runc#2128), and the additional mitigations in [opencontainers/runc#2130](opencontainers/runc#2130). * Add local-fs.target to service file to fix corrupt image after unexpected host reboot. Reported in [containerd#3671](containerd#3671), and fixed by [containerd#3746](containerd#3746). * Update Golang runtime to 1.12.13, which includes security fixes to the `crypto/dsa` package made in Go 1.12.11 ([CVE-2019-17596](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17596)), and fixes to the go command, `runtime`, `syscall` and `net` packages (Go 1.12.12). * CRI fixes: - Fix shim delete error code to avoid unnecessary retries in the CRI plugin. Discovered in [containerd/cri#1309](containerd/cri#1309), and fixed by [containerd#3732](containerd#3732) and [containerd#3739](containerd#3739). Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
a09f6c0
to
1b4aebd
Compare
I pushed an update, @thaJeztah can you review it looks good then we can get this released. |
@dmcgowan afaics, changes look good, but looking what change you made 😅 |
LGTM |
Update the runc vendor to v1.0.0-rc9 which includes an additional mitigation for
CVE-2019-16884.
Add local-fs.target to service file to fix corrupt image after unexpected host reboot.
Reported in containerd/containerd#3671,
and fixed by containerd/containerd#3746.
Update Golang runtime to 1.12.13, which includes security fixes to the
crypto/dsa
package made in Go 1.12.11 (CVE-2019-17596), and fixes to the go command,
runtime
,syscall
andnet
packages (Go 1.12.12).CRI fixes: