This repository was archived by the owner on Mar 16, 2024. It is now read-only.
fix(deps): update module github.com/containerd/containerd to v1.6.26 [security] #2385
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v1.6.20->v1.6.26Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
GitHub Vulnerability Alerts
GHSA-7ww5-4wqc-m92c
/sys/devices/virtual/powercap accessible by default to containers
Intel's RAPL (Running Average Power Limit) feature, introduced by the Sandy Bridge microarchitecture, provides software insights into hardware energy consumption. To facilitate this, Intel introduced the powercap framework in Linux kernel 3.13, which reads values via relevant MSRs (model specific registers) and provides unprivileged userspace access via
sysfs. As RAPL is an interface to access a hardware feature, it is only available when running on bare metal with the module compiled into the kernel.By 2019, it was realized that in some cases unprivileged access to RAPL readings could be exploited as a power-based side-channel against security features including AES-NI (potentially inside a SGX enclave) and KASLR (kernel address space layout randomization). Also known as the PLATYPUS attack, Intel assigned CVE-2020-8694 and CVE-2020-8695, and AMD assigned CVE-2020-12912.
Several mitigations were applied; Intel reduced the sampling resolution via a microcode update, and the Linux kernel prevents access by non-root users since 5.10. However, this kernel-based mitigation does not apply to many container-based scenarios:
sysfsis mounted inside containers read-only; however only read access is needed to carry out this attack on an unpatched CPUWhile this is not a direct vulnerability in container runtimes, defense in depth and safe defaults are valuable and preferred, especially as this poses a risk to multi-tenant container environments. This is provided by masking
/sys/devices/virtual/powercapin the default mount configuration, and adding an additional set of rules to deny it in the default AppArmor profile.While
sysfsis not the only way to read from the RAPL subsystem, other ways of accessing it require additional capabilities such asCAP_SYS_RAWIOwhich is not available to containers by default, orperfparanoia level less than 1, which is a non-default kernel tunable.References
Release Notes
containerd/containerd (github.com/containerd/containerd)
v1.6.26: containerd 1.6.26Compare Source
Welcome to the v1.6.26 release of containerd!
The twenty-sixth patch release for containerd 1.6 contains various fixes and updates.
Notable Updates
/sys/devices/virtual/powercappath in runtime spec and deny in default apparmor profile (GHSA-7ww5-4wqc-m92c)Deprecation Warnings
See the changelog for complete list of changes
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
30 commits
ac5c5d3e0Prepare release notes for v1.6.2602f07fe19contrib/apparmor: deny /sys/devices/virtual/powercapc94577e78oci/spec: deny /sys/devices/virtual/powercap7cbdfc92eupdate to go1.20.12, test go1.21.5024b1cce6update to go1.20.11, test go1.21.464e56bfdeAdd cri-api v1alpha2 usage warning to all api callsefefd3bf3tasks: emit warning for runc v1 runtime7825689b4tasks: emit warning for v1 runtime7cfe7052fsnapshots: emit deprecation warning for aufsa1ae572a2Fix linter error with updated linterb638791d6ci: bump up golangci-lint to v1.55.02370a2842Fix linter issues for golangci-lint 1.54.28a65e2e31Bump up golangci-lint to v1.54.2969f8feb2Bump up golangci-lint to v1.52.266959fdf5push: inherit distribution sources from parentb4dcffcfbcontent: add InfoProvider interfacebef4145c1Change PushContent to require only Providera5fc21060vendor: google.golang.org/grpc v1.58.34fa05b3d8Upgrade github.com/klauspost/compress from v1.11.13 to v1.15.9ede0ad5e1Fix windows default path overwrite issueDependency Changes
2bc19b1-> v0.10.0Previous release can be found at v1.6.25
v1.6.25: containerd 1.6.25Compare Source
Welcome to the v1.6.25 release of containerd!
The twenty-fifth patch release for containerd 1.6 contains various fixes and updates.
Notable Updates
See the changelog for complete list of changes
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
82 commits
723d26ab2Prepare release notes for v1.6.251f865eba1update mailmapb49815300cri: fix update of pinned label for images751b0c186cri: fix using the pinned label to pin imagefb5568608vendor: golang.org/x/net v0.17.061ad86f6fvendor: golang.org/x/text v0.13.04b431c844vendor: golang.org/x/sys v0.13.062d402275Remove CVE-2022-1996 from containerd binary upgrading go-restful to 2.16.03e68bf65aEnhance container image unpack client logs0dd65c826[release/1.6] update github.com/containerd/nri v0.1.1c73be2446update runc binary to v1.1.10746bcf2ebExpose usage of cri-api v1alpha28b51a95fbfix: shimv1 leak issue6741f819b[release/1.6] update to go1.20.10, test go1.21.349615a0e9[release/1.6] update to go1.20.9, test go1.21.2b68204e53cri: add deprecation warning for configsae8c58319cri: add deprecation warning for auths455edcad2cri: add deprecation warning for mirrors878823f4dcri: add ability to emit deprecation warnings477b7d6a1ctr: new deprecations command24068b813dynamic: record deprecation for dynamic plugins218c7a1dfserver: add ability to record config deprecationsdfb9e1debpull: record deprecation warning for schema 190b42da6fintrospection: add support for deprecations0b6766b37api/introspection: deprecation warnings in serverde3cb4c18warning: new service for deprecationsda1b4419bdeprecation: new package for deprecationsbca8a3f65integration: deflake TestIssue91030985f7a43ci: Use Vagrant on ubuntu-latest-4-cores5dd64301cCheck scheme and host of request on push redirect51df21d09Avoid TLS fallback when protocol is not ambiguous8108f0d03Add a new image label if it is docker schema 15376afb3dfix protobuf aarch64e529741d3remotes: add handling for missing basic auth credentialsca45b92f4Add ErrUnexpectedStatus to resolver77c0175b4Improve ErrUnexpectedStatus default string275fc594dBump x/net to 0.135223bf39aRequire plugins to succeed after registering readiness8f5eba314cri: call RegisterReadiness after NewCRIService7b61862e7*: add runc-fp as runc wrapper to inject failpoint5238a6470containerd-shim-runc-v2: avoid potential deadlock in create handler65e908ee1containerd-shim-runc-v2: remove unnecessarys.getContainer()1dd9acecbUncopypaste parsing of OCI Bundle spec file71c89ddf2[release/1.6]: Vagrantfile: install failpoint binaries7a0c8b6b7cri: stop recommending disable_cgroup8066dd81cAllow for images with artifacts to pull2fffc344aremotes/docker: Fix MountedFrom prefixed with target repository6b5912220remotes: always try to establish tls connection when tls configured37c758de1Build binaries with 1.21.1f1591cc9balias log package to github.com/containerd/log v0.1.0f68d2d93bvendor: golang.org/x/sys v0.7.0f305fb233vendor: github.com/stretchr/testify v1.8.44e24a30afvendor: github.com/sirupsen/logrus v1.9.3b66c818baremotes/docker: Add MountedFrom and Exists push statusChanges from containerd/log
9 commits
89c9a54Update golangci to 1.49cf26711Update description in READMEf9f250cAdd project detailsfb7fe3dAdd github CI flow7e13034Add go module16a3c76Rename log import from logtest698c398Add README87c83c4Add license fileChanges from containerd/nri
3 commits
4275101Task: fix typo in godocf6acbf1remove containerd as dependencyDependency Changes
3147a52-> v0.14.0Previous release can be found at v1.6.24
v1.6.24: containerd 1.6.24Compare Source
Welcome to the v1.6.24 release of containerd!
The twenty-fourth patch release for containerd 1.6 contains various fixes and updates.
Notable Updates
See the changelog for complete list of changes
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
45 commits
cdd59290dPrepare release notes for v1.6.2433c2d88e7Revert "log: define G() as a function instead of a variable"0a7f2975elog: swap logrus functions with their equivalent on default logger9d175a19blog: add package documentation and summary of package's purpose96fb65529log: make Fields type a generic map[string]anybace17e2elog: add log.Entry typedd127885flog: define OutputFormat type5b4cf2329log: define G() as a function instead of a variableee1b4a1e2log: add all log-levels that are acceptedd563a411flog: group "enum" consts and touch-up docs6e8f4555blog: WithLogger: remove redundant intermediate varc19325559log: SetFormat: include returns in switchc3c22f8cblog: remove gotest.tools dependencya2c294800[release/1.6] update to go1.20.80da8dcaa7make repositories of install dependencies configurable8e6a9de5bupdate to go1.20.7, go1.19.128b2eb371fUpdate Go to 1.20.6,1.19.11cff669c7aupdate go to go1.20.5, go1.19.10f34a22de9update go to go1.20.4, go1.19.9e8e73065eupdate go to go1.20.3, go1.19.89b3f950d6Go 1.20.217d03ac68Go 1.20.1861f65447go.mod: go 1.1981fa93784Stop using math/rand.Read and rand.Seed (deprecated in Go 1.20)70dc11a6clint: remove//nolint:dupwordthat are no longer neededfec784a06lint: silence "SA1019: tar.TypeRegA has been deprecated... (staticheck)"6648df1adlint: silence "typeHostFileConfigis unused (unused)"e6b268bc7golangci-lint v1.51.1c552ccf67go.mod: golang.org/x/sync v0.1.0d00af5c3eintegration: issue7496 case should work for runc.v2 only583696e4eVagrantfile: add strace toolab21d60d2pkg/cri/server: add criService as argument when handle exit eventa229883cbpkg/cri/server: fix leaked shim issued8f824200integration: add case to reproduce #74968cd40e1d0Add configurable mount options to overlay453fa397afeat: make overlay sync removal configurable4cb7764dfupdate runc binary to v1.1.9Dependency Changes
036812b-> v0.1.0Previous release can be found at v1.6.23
v1.6.23: containerd 1.6.23Compare Source
Welcome to the v1.6.23 release of containerd!
The twenty-third patch release for containerd 1.6 contains various fixes and updates.
Notable Updates
See the changelog for complete list of changes
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
13 commits
e297a668fAdd release notes for v1.6.23f51bf1960Add support for stable ABI windows versions43a02c0b2Update hcsshim tag to v0.9.10cc5b0a21bcri: Don't use rel path for image volumes4238cff1cUpgrade GitHub actions packages in release workflow00d1092b7update to go1.19.1247d73b2deFix ro mount option being passedDependency Changes
Previous release can be found at v1.6.22
v1.6.22: containerd 1.6.22Compare Source
Welcome to the v1.6.22 release of containerd!
The twenty-second patch release for containerd 1.6 contains various fixes and updates.
Notable Updates
UpdateContainerStats(#8819)name_to_handle_at(#8754)close()io beforecancel()(#8659)See the changelog for complete list of changes
Please try out the release binaries and report any issues at
https://github.com/containerd/containerd/issues.
Contributors
Changes
95 commits
0770a4601[release/1.6] Add release notes for v1.6.22512a672afmigrate to community owned bucketb585ff155cri: memory.memsw.limit_in_bytes: no such file or directorya322077bfgo.mod: github.com/emicklei/go-restful/v3 v3.10.1b3ac068ebupdate runc binary to v1.1.86e2bcb6ddci: remove libseccomp-dev installation for nightlycd06f23afcapture desc variable in range variable just in case that it run in parallel mode30f5c6a1fUse t.TempDir instead of os.MkdirTemp59d8363effix userstr for dditionalGids on Linuxd75bf78c2ctr: update WritePidFile to use atomicfile5f70b23c1shim: WritePidFile & WriteAddress use atomicfile505d444b0cri: write generated CNI config atomically on Unixb2d2d3829atomicfile: new package for atomic file writes9f650143fFix concurrent writes for UpdateContainerStats568ce91caMake checkContainerTimestamps less strict on Windowsd2f47192adependency: bump go.etcd.io/bbolt to v1.3.7fb56dc245[release/1.6] vendor: github.com/stretchr/testify v1.8.17fbd5dc89Move logrus setup code to log package59a143670release: Add "cri-containerd.DEPRECATED.txt" in the deprecated cri-containerd-* bundles5b51b79e2[release/1.6] fix remaining "v1 config" plugin IDsb7cf26d8ddocs: Fix sample config.toml syntaxfcdaf0966docs: migrate config v1 to v2728d5c5f0Use version 2 config and mention containerd config command81aa14718[release/1.6] update go to go1.19.1117cd86629[release/1.6] update go to go1.19.10fdb65f214bugfix(port-forward): Correctly handle known errorsb5784af66Change http.Header copy to builtin Clone31c466f82Resolve docker.NewResolver race conditionbe6406ca6vendor: github.com/containerd/zfs v1.1.09f1260074[release/1.6] vendor gotest.tools/v3 v3.5.0526e9e0ceBump grpc to v1.50.10e7d2d121go.mod: github.com/sirupsen/logrus v1.9.05b153c621go.mod: github.com/moby/sys/mountinfo v0.6.29dee60960go.mod: github.com/moby/sys/mountinfo v0.6.007ea7b9e7seccomp: always allow name_to_handle_at1dae51fedUpdate ginkgo to match cri-tools' versionTestShimOOMScore(#8749)bd76ab978integration/client: add timeout toTestShimOOMScore8e14eccb2Adding support to run hcsshim from local clone9f2cdd589Add Fields type alias to log packagef4713aad0Pinned image supportdbeec47b4runtime/v2/runc: handle early exits w/o big locksa8e01e40amove to CRI-TOOLS v1.27.0755f80698move up to CRI-TOOLS v1.26.0b29cc035fbump critools intoca1571e9138999f5Upgrade critools from 1.24.1 to 1.25.0712ff8eb3No more nondistributable layers in MS registry2b16e4bfaAdd unit test to function GetCPUVariantFromArch106e36ec3Use uname machine field to get CPU variant if fails at /proc/cpuinfo287fdfea6Update linter timeout to match main branchclose()io beforecancel()(#8659)b27f7daa5task: don'tclose()io beforecancel()8b4c69248update test box to fedora 3781d6085afRevert "Downgrade MinGW to version 10.2.0"f98122378Fix panic when remote differ returns empty resultaa53f272dBump x/net to 0.856ff20839remotes/docker: ResolverOptions: fix deprecation commentsbccaf68b7notify readiness when registered plugins are ready1cdbbe76bUpdate ttrpc to 1.1.2Changes from containerd/ttrpc
2 commits
d5f7eedUnwrap io errors in server connection receive error handlingChanges from containerd/zfs
49 commits
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.