[release/1.2] Prepare v1.2.12 release#3984
Conversation
69aaca5 to
83110dc
Compare
There was a problem hiding this comment.
Not sure if this one should be mentioned; IIUC the CVE was in the runc binary, and the updated dependency has no effect in this code-base (please double check); if so, I'm inclined to remove the mention here and above
There was a problem hiding this comment.
This is pending containerd/cri#1388 to be merged, and containerd/cri to be re-vendored
|
Generated release notes: containerd 1.2.12 Welcome to the v1.2.12 release of containerd! The twelfth patch release for Notable Updates
API
Please try out the release binaries and report any issues at Contributors
Changes
Changes from containerd/cri
Dependency ChangesPrevious release can be found at v1.2.11
|
|
Also probably good to vendor before release;
|
|
@thaJeztah those both appear to be complete and I just compared cri 1.2 branch with our |
|
nope; I think we should be done. I'll update this PR to add the missing changes to the changelog |
83110dc to
cf994ed
Compare
|
Updated, and moved out of draft 👍 |
Codecov Report
@@ Coverage Diff @@
## release/1.2 #3984 +/- ##
============================================
Coverage 44.19% 44.19%
============================================
Files 100 100
Lines 10847 10847
============================================
Hits 4794 4794
Misses 5313 5313
Partials 740 740
Continue to review full report at Codecov.
|
cf994ed to
35c414a
Compare
|
rebased, as some changes went into the branch |
|
@dmcgowan we didn't merge yet; merge whenever you're ready |
|
This is ready to go, I'll merge it in a bit when ready to do the release. I want to make sure the 1.3.x is also ready to go. I'll open up that PR shortly |
Signed-off-by: Derek McGowan <[email protected]>
* Update the runc vendor to v1.0.0-rc10 which includes a mitigation for [CVE-2019-19921](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19921). * Update the opencontainers/selinux which includes a mitigation for [CVE-2019-16884](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16884). * Update Golang runtime to 1.12.16, mitigating the [CVE-2020-0601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0601) certificate verification bypass on Windows, and [CVE-2020-7919](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919), which only affects 32-bit architectures. * Update Golang runtime to 1.12.15, which includes a fix to the runtime (Go 1.12.14, Go 1.12.15) and and the `net/http` package (Go 1.12.15) * A fix to prevent `SIGSEGV` when starting containerd-shim [containerd#3960](containerd#3960) * Fixes to `exec` [containerd#3755](containerd#3755) - Prevent `docker exec` hanging if an earlier `docker exec` left a zombie process - Prevent High system load/CPU utilization with liveness and readiness probes - Prevent Docker healthcheck causing high CPU utilization * CRI fixes: - Update the `gopkg.in/yaml.v2` vendor to v2.2.8 with a mitigation for [CVE-2019-11253](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11253) * API - Fix API filters to properly handle and return parse errors [containerd#3950](containerd#3950) Signed-off-by: Sebastiaan van Stijn <[email protected]>
35c414a to
79d6576
Compare
Update the runc vendor to v1.0.0-rc10 which includes a mitigation for CVE-2019-19921.
Update the opencontainers/selinux which includes a mitigation for CVE-2019-16884.
Update Golang runtime to 1.12.15, which includes a fix to the runtime (Go 1.12.14, Go 1.12.15) and and the
net/httppackage (Go 1.12.15)A fix to prevent
SIGSEGVwhen starting containerd-shim containerd/containerd#3960Fixes to
execcontainerd/containerd#3755docker exechanging if an earlierdocker execleft a zombie processCRI fixes:
gopkg.in/yaml.v2vendor to v2.2.8 with a mitigation for CVE-2019-11253