Skip to content

Commit 79d6576

Browse files
thaJeztahdmcgowan
authored andcommitted
Prepare v1.2.12 release
* Update the runc vendor to v1.0.0-rc10 which includes a mitigation for [CVE-2019-19921](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19921). * Update the opencontainers/selinux which includes a mitigation for [CVE-2019-16884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16884). * Update Golang runtime to 1.12.16, mitigating the [CVE-2020-0601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0601) certificate verification bypass on Windows, and [CVE-2020-7919](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919), which only affects 32-bit architectures. * Update Golang runtime to 1.12.15, which includes a fix to the runtime (Go 1.12.14, Go 1.12.15) and and the `net/http` package (Go 1.12.15) * A fix to prevent `SIGSEGV` when starting containerd-shim [#3960](#3960) * Fixes to `exec` [#3755](#3755) - Prevent `docker exec` hanging if an earlier `docker exec` left a zombie process - Prevent High system load/CPU utilization with liveness and readiness probes - Prevent Docker healthcheck causing high CPU utilization * CRI fixes: - Update the `gopkg.in/yaml.v2` vendor to v2.2.8 with a mitigation for [CVE-2019-11253](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11253) * API - Fix API filters to properly handle and return parse errors [#3950](#3950) Signed-off-by: Sebastiaan van Stijn <[email protected]>
1 parent 9be62a7 commit 79d6576

2 files changed

Lines changed: 44 additions & 1 deletion

File tree

releases/v1.2.12.toml

Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
# commit to be tagged for new release
2+
commit = "HEAD"
3+
4+
project_name = "containerd"
5+
github_repo = "containerd/containerd"
6+
match_deps = "^github.com/(containerd/[a-zA-Z0-9-]+)$"
7+
8+
# previous release
9+
previous = "v1.2.11"
10+
11+
pre_release = false
12+
13+
preface = """\
14+
The twelfth patch release for `containerd` 1.2 includes an updated runc with
15+
a fix for CVE-2019-19921, an updated version of the opencontainers/selinux
16+
dependency, which includes a fix for CVE-2019-16884, an updated version of the
17+
`gopkg.in/yaml.v2` dependency to address CVE-2019-11253, and a Golang update.
18+
19+
### Notable Updates
20+
21+
* Update the runc vendor to v1.0.0-rc10 which includes a mitigation for [CVE-2019-19921](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19921).
22+
* Update the opencontainers/selinux which includes a mitigation for [CVE-2019-16884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16884).
23+
* Update Golang runtime to 1.12.16, mitigating the [CVE-2020-0601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0601) certificate verification bypass on Windows, and [CVE-2020-7919](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919), which only affects 32-bit architectures.
24+
* Update Golang runtime to 1.12.15, which includes a fix to the runtime (Go 1.12.14, Go 1.12.15) and and the `net/http` package (Go 1.12.15)
25+
* A fix to prevent `SIGSEGV` when starting containerd-shim [containerd/containerd#3960](https://github.com/containerd/containerd/pull/3960)
26+
* Fixes to `exec` [containerd/containerd#3755](https://github.com/containerd/containerd/pull/3755)
27+
- Prevent `docker exec` hanging if an earlier `docker exec` left a zombie process
28+
- Prevent High system load/CPU utilization with liveness and readiness probes
29+
- Prevent Docker healthcheck causing high CPU utilization
30+
31+
* CRI fixes:
32+
- Update the `gopkg.in/yaml.v2` vendor to v2.2.8 with a mitigation for [CVE-2019-11253](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11253)
33+
34+
### API
35+
36+
* Fix API filters to properly handle and return parse errors [containerd/containerd#3950](https://github.com/containerd/containerd/pull/3950)
37+
38+
"""
39+
40+
# notable prs to include in the release notes, 1234 is the pr number
41+
[notes]
42+
43+
[breaking]

version/version.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ var (
2121
Package = "github.com/containerd/containerd"
2222

2323
// Version holds the complete version number. Filled in at linking time.
24-
Version = "1.2.11+unknown"
24+
Version = "1.2.12+unknown"
2525

2626
// Revision is filled with the VCS (e.g. git) revision being used to build
2727
// the program at linking time.

0 commit comments

Comments
 (0)