forked from kubernetes-sigs/kubespray
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
e69e0c5
commit 6fa8c3b
Showing
7 changed files
with
29 additions
and
1 deletion.
There are no files selected for viewing
Binary file not shown.
Binary file not shown.
Binary file not shown.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,7 @@ | ||
{ | ||
"tagName": "v1.2.1", | ||
"url": "https://github.com/opencontainers/runc/releases/tag/v1.2.1", | ||
"description": "This is the first patch release of the 1.2.z series of runc. It includes\r\na critical bugfix for an issue that manifested on SELinux-based\r\ndistributions and was blocking containerd from updating to\r\nrunc 1.2.z.\r\n\r\nIn addition, runc-dmz (added in 1.2.0) has been removed entirely. This\r\nwas opt-in (due to the many limitations it had), but the late addition\r\nof the overlayfs-based CVE-2019-5736 protection made it no longer\r\nnecessary at all.\r\n\r\n + We now explicitly become root after joining an existing user namespace.\r\n Otherwise, runc won't have permissions to configure some mounts when\r\n running under SELinux and runc is not creating the user namespace.\r\n (#4466, #4477)\r\n - Remove dependency on `golang.org/x/sys/execabs` from go.mod. (#4480)\r\n - Remove runc-dmz, that had many limitations, and is mostly made obsolete by\r\n the new protection mechanism added in v1.2.0. Note that runc-dmz was only\r\n available only in the 1.2.0 release and required to set an environment variable\r\n to opt-in. (#4488)\r\n * The `script/check-config.sh` script now checks for overlayfs support. (#4494)\r\n * When using cgroups v2, allow to set or update memory limit to \"unlimited\"\r\n and swap limit to a specific value. (#4501)\r\n\r\n### Static Linking Notices ###\r\n\r\nThe `runc` binary distributed with this release are *statically linked* with\r\nthe following [GNU LGPL-2.1][lgpl-2.1] licensed libraries, with `runc` acting\r\nas a \"work that uses the Library\":\r\n\r\n[lgpl-2.1]: https://www.gnu.org/licenses/old-licenses/lgpl-2.1.en.html\r\n\r\n - [libseccomp](https://github.com/seccomp/libseccomp)\r\n\r\nThe versions of these libraries were not modified from their upstream versions,\r\nbut in order to comply with the LGPL-2.1 (§6(a)), we have attached the\r\ncomplete source code for those libraries which (when combined with the attached\r\nrunc source code) may be used to exercise your rights under the LGPL-2.1.\r\n\r\nHowever we strongly suggest that you make use of your distribution's packages\r\nor download them from the authoritative upstream sources, especially since\r\nthese libraries are related to the security of your containers.\r\n\r\n<hr/>\r\n\r\nThanks to all of the contributors who made this release possible:\r\n\r\n * Akihiro Suda <[email protected]>\r\n * Aleksa Sarai <[email protected]>\r\n * Kir Kolyshkin <[email protected]>\r\n * Rodrigo Campos <[email protected]>\r\n * Wei Fu <[email protected]>\r\n * lifubang <[email protected]>\r\n\r\nSigned-off-by: Aleksa Sarai <[email protected]>", | ||
"publishedAt": "2024-11-01T22:23:57Z", | ||
"isLatest": true | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
{ | ||
"runc": { | ||
"current_version": "v1.1.13", | ||
"latest_version": "v1.2.1", | ||
"release": { | ||
"tagName": "v1.2.1", | ||
"url": "https://github.com/opencontainers/runc/releases/tag/v1.2.1", | ||
"description": "This is the first patch release of the 1.2.z series of runc. It includes\r\na critical bugfix for an issue that manifested on SELinux-based\r\ndistributions and was blocking containerd from updating to\r\nrunc 1.2.z.\r\n\r\nIn addition, runc-dmz (added in 1.2.0) has been removed entirely. This\r\nwas opt-in (due to the many limitations it had), but the late addition\r\nof the overlayfs-based CVE-2019-5736 protection made it no longer\r\nnecessary at all.\r\n\r\n + We now explicitly become root after joining an existing user namespace.\r\n Otherwise, runc won't have permissions to configure some mounts when\r\n running under SELinux and runc is not creating the user namespace.\r\n (#4466, #4477)\r\n - Remove dependency on `golang.org/x/sys/execabs` from go.mod. (#4480)\r\n - Remove runc-dmz, that had many limitations, and is mostly made obsolete by\r\n the new protection mechanism added in v1.2.0. Note that runc-dmz was only\r\n available only in the 1.2.0 release and required to set an environment variable\r\n to opt-in. (#4488)\r\n * The `script/check-config.sh` script now checks for overlayfs support. (#4494)\r\n * When using cgroups v2, allow to set or update memory limit to \"unlimited\"\r\n and swap limit to a specific value. (#4501)\r\n\r\n### Static Linking Notices ###\r\n\r\nThe `runc` binary distributed with this release are *statically linked* with\r\nthe following [GNU LGPL-2.1][lgpl-2.1] licensed libraries, with `runc` acting\r\nas a \"work that uses the Library\":\r\n\r\n[lgpl-2.1]: https://www.gnu.org/licenses/old-licenses/lgpl-2.1.en.html\r\n\r\n - [libseccomp](https://github.com/seccomp/libseccomp)\r\n\r\nThe versions of these libraries were not modified from their upstream versions,\r\nbut in order to comply with the LGPL-2.1 (§6(a)), we have attached the\r\ncomplete source code for those libraries which (when combined with the attached\r\nrunc source code) may be used to exercise your rights under the LGPL-2.1.\r\n\r\nHowever we strongly suggest that you make use of your distribution's packages\r\nor download them from the authoritative upstream sources, especially since\r\nthese libraries are related to the security of your containers.\r\n\r\n<hr/>\r\n\r\nThanks to all of the contributors who made this release possible:\r\n\r\n * Akihiro Suda <[email protected]>\r\n * Aleksa Sarai <[email protected]>\r\n * Kir Kolyshkin <[email protected]>\r\n * Rodrigo Campos <[email protected]>\r\n * Wei Fu <[email protected]>\r\n * lifubang <[email protected]>\r\n\r\nSigned-off-by: Aleksa Sarai <[email protected]>", | ||
"publishedAt": "2024-11-01T22:23:57Z", | ||
"isLatest": true, | ||
"component": "runc", | ||
"owner": "opencontainers", | ||
"repo": "runc", | ||
"release_type": "release" | ||
} | ||
} | ||
} |