|
| 1 | +# commit to be tagged for new release |
| 2 | +commit = "HEAD" |
| 3 | + |
| 4 | +project_name = "containerd" |
| 5 | +github_repo = "containerd/containerd" |
| 6 | +match_deps = "^github.com/(containerd/[a-zA-Z0-9-]+)$" |
| 7 | + |
| 8 | +# previous release |
| 9 | +previous = "v1.2.11" |
| 10 | + |
| 11 | +pre_release = false |
| 12 | + |
| 13 | +preface = """\ |
| 14 | +The twelfth patch release for `containerd` 1.2 includes an updated runc with |
| 15 | +a fix for CVE-2019-19921, an updated version of the opencontainers/selinux |
| 16 | +dependency, which includes a fix for CVE-2019-16884, an updated version of the |
| 17 | +`gopkg.in/yaml.v2` dependency to address CVE-2019-11253, and a Golang update. |
| 18 | +
|
| 19 | +### Notable Updates |
| 20 | +
|
| 21 | +* Update the runc vendor to v1.0.0-rc10 which includes a mitigation for [CVE-2019-19921](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19921). |
| 22 | +* Update the opencontainers/selinux which includes a mitigation for [CVE-2019-16884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16884). |
| 23 | +* Update Golang runtime to 1.12.16, mitigating the [CVE-2020-0601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0601) certificate verification bypass on Windows, and [CVE-2020-7919](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919), which only affects 32-bit architectures. |
| 24 | +* Update Golang runtime to 1.12.15, which includes a fix to the runtime (Go 1.12.14, Go 1.12.15) and and the `net/http` package (Go 1.12.15) |
| 25 | +* A fix to prevent `SIGSEGV` when starting containerd-shim [containerd/containerd#3960](https://github.com/containerd/containerd/pull/3960) |
| 26 | +* Fixes to `exec` [containerd/containerd#3755](https://github.com/containerd/containerd/pull/3755) |
| 27 | + - Prevent `docker exec` hanging if an earlier `docker exec` left a zombie process |
| 28 | + - Prevent High system load/CPU utilization with liveness and readiness probes |
| 29 | + - Prevent Docker healthcheck causing high CPU utilization |
| 30 | +
|
| 31 | +* CRI fixes: |
| 32 | + - Update the `gopkg.in/yaml.v2` vendor to v2.2.8 with a mitigation for [CVE-2019-11253](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11253) |
| 33 | +
|
| 34 | +### API |
| 35 | +
|
| 36 | +* Fix API filters to properly handle and return parse errors [containerd/containerd#3950](https://github.com/containerd/containerd/pull/3950) |
| 37 | +
|
| 38 | +""" |
| 39 | + |
| 40 | +# notable prs to include in the release notes, 1234 is the pr number |
| 41 | +[notes] |
| 42 | + |
| 43 | +[breaking] |
0 commit comments