raviprpandey
b203de4f7d
Set OOMScoreAdjust to -999 for containerd ( #6819 )
2023-12-22 16:14:13 -08:00
Rohit Rawat
e87fb99c84
Fix CVE-2020-8694, CVE-2020-8695 and CVE-2020-12912 ( #7029 )
...
Fixes moby-engine and moby-containerd by upgrade
2023-12-20 20:40:33 +05:30
Nan Liu
85350c6651
Update change logs to sync up with the ones in PMC ( #6750 )
2023-11-14 17:01:14 -08:00
Nan Liu
15bf461433
Fix golang CVE-2023-29409, CVE-2023-39318, CVE-2023-39319, CVE-2023-39323, CVE-2023-39533 ( #6470 )
2023-10-31 14:50:57 -07:00
Pawel Winogrodzki
01547eeed5
Fixed CVE-2023-44487 in `nginx` and `golang` (CP of #6381 ) ( #6395 )
...
* Fixed CVE-2023-44487 in `nginx` and `golang` (#6381 )
Co-authored-by: Dan Streetman <ddstreet@ieee.org>
Co-authored-by: Pawel Winogrodzki <pawelwi@microsoft.com>
* Bumping 'kubernetes'.
---------
Co-authored-by: Dan Streetman <ddstreet@microsoft.com>
Co-authored-by: Dan Streetman <ddstreet@ieee.org>
2023-10-12 14:22:26 -07:00
Chris PeBenito
47ed0529c5
Add /opt/containerd/{bin,lib} to RPMs and cherry-pick fix for systemd-hostnamed default-hostname in SELinux. ( #6311 )
...
* filesystem: Restore /opt.
/opt is part of FHS. This fixes an issue on SELinux systems where
containerd will create /opt but we'd prefer not to allow this in
the policy.
Signed-off-by: Chris PeBenito <Christopher.PeBenito@microsoft.com>
* selinux-policy: systemd-hostnamed fix.
Cherry pick systemd-hostnamed fix for handling /run/systemd/default-hostname.
Signed-off-by: Chris PeBenito <Christopher.PeBenito@microsoft.com>
* containerd: Precreate /opt/containerd/{bin,lib}.
These are created by io.containerd.internal.v1.opt but it results in the
dirs having incorrect SELinux lables. Creating them in the package will
ensure correct labeling.
Signed-off-by: Chris PeBenito <Christopher.PeBenito@microsoft.com>
---------
Signed-off-by: Chris PeBenito <Christopher.PeBenito@microsoft.com>
2023-10-12 10:31:13 -04:00
Muhammad Falak R Wani
d82493a5f9
golang: bump golang 1.19.12 -> 1.20.7 ( #6001 )
...
Bump following packages:
- golang: 1.19.12 -> 1.20.7
- moby-cli: 20.10.24 -> 20.10.25
- moby-engine: 20.10.24 -> 20.10.25
- moby-containerd:1.6.18 -> 1.6.22
- moby-runc: 1.1.5 -> 1.1.9
This PR fixes docker `http: invalid Host header` error and
bootstraps the go1.20 compiler with go1.19.12 instead of go1.4
Reference: https://go.dev/doc/go1.20#bootstrap
Signed-off-by: Muhammad Falak R Wani <falakreyaz@gmail.com>
2023-08-21 22:31:35 +05:30
Muhammad Falak R Wani
e2ad74a2ca
Upgrade golang to 1.19.12 to address CVE-2023-29409 ( #5946 )
...
* golang: introduce patch to permit requests with invalid host headers
Reference: https://go-review.googlesource.com/c/go/+/518855
Signed-off-by: Muhammad Falak R Wani <falakreyaz@gmail.com>
2023-08-16 10:15:25 +05:30
CBL-Mariner-Bot
78e1d24d47
Upgrade golang to 1.19.11 to fix CVE-2023-29406 ( #5828 )
2023-07-13 13:55:07 -07:00
CBL-Mariner-Bot
c5a190f783
[AUTOPATCHER-CORE] Upgrade golang to 1.19.10 Address CVE-2023-24540, CVE-2023-29402, CVE-2023-29403, CVE-2023-29404, CVE-2023-29405 ( #5689 )
...
* Upgrade golang to 1.19.10 Adress CVEs
* Fix changelog
---------
Co-authored-by: Mitch Zhu <mitchzhu@microsoft.com>
2023-06-20 13:39:41 -07:00
Muhammad Falak R Wani
a364e616af
golang: upgrade to 1.19.8 to address CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-24538 ( #5228 )
...
Reference: https://github.com/golang/go/issues?q=milestone%3AGo1.19.8+label%3ASecurity
Signed-off-by: Muhammad Falak R Wani <falakreyaz@gmail.com>
2023-04-05 21:38:04 +05:30
CBL-Mariner-Bot
42a2d6d72d
Upgrade golang to 1.19.7 to address CVE-2023-24532 ( #5160 )
...
Signed-off-by: Muhammad Falak R Wani <falakreyaz@gmail.com>
2023-03-28 13:20:34 +05:30
CBL-Mariner-Bot
768aae23e3
Upgrade golang to 1.19.6 Address CVE-2022-41722, CVE-2022-41724, CVE-2022-41725, CVE-2022-41723 ( #5096 )
...
Co-authored-by: Rakshaa Viswanathan <46165429+rakshaa2000@users.noreply.github.com>
2023-03-17 21:20:58 +05:30
CBL-Mariner-Bot
1a316eb216
[AUTOPATCHER-CORE] Upgrade moby-containerd to 1.6.18 to fix CVE-2023-25173, CVE-2023-25153 - ( #5068 )
...
* Upgrade moby-containerd to 1.6.18 to fix CVE-2023-25173, CVE-2023-25153
* update commit hash to match version 1.6.18
2023-03-13 12:39:41 -07:00
CBL-Mariner-Bot
5ed28413bb
[AUTOPATCHER-CORE] Upgrade golang to 1.19.5 upgrade to latest - ( #4759 )
...
* Upgrade golang to 1.19.5 upgrade to latest
* remove release bump of spec that should stay on golang 1.18.8 or below
2023-02-03 20:56:43 +01:00
CBL-Mariner-Bot
63c1d45e66
[AUTOPATCHER-CORE] Upgrade golang to 1.19.4 upgrade to latest - ( #4643 )
...
* Upgrade golang to 1.19.4 upgrade to latest
* fix issues due to golang 1.19.4 upgrade
* re-add CVE-2022-41717.patch which is required by golang 1.17 spec
* clean up gh dependencies
2023-01-19 18:37:17 +01:00
aadhar-agarwal
71c623da4d
Backport upstream fix in containerd to add ptrace readby and tracedby to default AppArmor profile ( #4475 )
2022-12-21 10:35:02 -08:00
Daniel McIlvaney
449fbf1b41
Patch golang to resolve CVE-2022-41717 ( #4457 )
...
* Patch golang to resolve CVE-2022-41717
2022-12-19 12:17:43 -08:00
CBL-Mariner-Bot
8cd9b00d73
upgrade moby-containerd to 1.6.12 to fix CVE-2022-23471 ( #4449 )
2022-12-14 13:03:22 -08:00
Olivia Crain
a828f488f8
Upgrade golang to 1.18.8 to fix CVE-2022-2879, CVE-2022-2880, CVE-2022-41715, CVE-2022-27664, CVE-2022-32190 ( #4157 )
2022-11-01 16:37:38 -07:00
Olivia Crain
fdc6619ad3
Bump supported go versions to 1.17.13, 1.18.5 to fix fifteen CVEs ( #3600 )
...
Co-authored-by: Pawel Winogrodzki <pawelwi@microsoft.com>
2022-08-24 09:01:02 -07:00
Henry Beberman
c24c3910f8
`moby-containerd`: upgrade to version 1.6.6 to fix CVE-2022-31030 ( #3230 )
2022-06-23 20:25:45 -07:00
Muhammad Falak R Wani
d76052103a
golang: bump version to 1.18.3 to address CVE-2022-24675 & CVE-2022-28327 ( #3163 )
...
* golang: rename specfile golang-1.17.spec -> golang.spec
* golang: bump version to 1.18.3 to address CVE-2022-24675 & CVE-2022-28327
* golang: bump release of dependent packages to force rebuild
* keda: verify license
* helm: verify license
* moby-containerd: bump version to 1.6.2 to address CVE-2022-24769
* golang: add go-1.17.10 to enable cert-manager
* cert-manger: add a hard BR on golang <= 1.17.10
* golang-17: add entry to cgimanifest
Signed-off-by: Muhammad Falak R Wani <falakreyaz@gmail.com>
2022-06-16 23:07:41 +05:30
nicolas guibourge
04df64f203
move docker to systemd cgroup by default ( #2606 )
...
Co-authored-by: Nicolas Guibourge <nicolasg@microsoft.com>
2022-03-29 16:10:48 -07:00
angop95
3a3b6dd0db
enable containerd service restart ( #2577 )
2022-03-23 16:48:33 -07:00
nicolas guibourge
4d1bc49e66
Upgrade moby-containerd to 1.6.1 ( #2486 )
...
Co-authored-by: Nicolas Guibourge <nicolasg@microsoft.com>
2022-03-21 10:03:14 -07:00
nicolas guibourge
f3d088f10b
fix wrong version for moby-containerd ( #2143 )
...
Co-authored-by: nicolas guibourge <nicolasg@microsoft.com>
2022-02-08 10:12:25 -08:00
nicolas guibourge
e8d4468606
upgrade moby-buildx, moby-runc, moby-containerd, moby-cli, moby-engine ( #2124 )
...
* upgrade moby-buildx
* upgrade moby-buildx
* upgrade moby-buildx
* upgrade moby-runc
* upgrade moby-runc
* upgrade moby-containerd
* upgrade moby-containerd
* upgrade moby-containerd
* upgrade moby-cli
* upgrade moby-engine
* Makes moby-engine spec relying on tini to provide docker-init
* upgrade moby-engine
* upgrade moby-engine
* add %check in moby-runc.spec
* address PR check
Co-authored-by: nicolas guibourge <nicolasg@microsoft.com>
2022-02-08 08:53:21 -08:00
Henry Beberman
5a14914378
Update moby-containerd to 1.5.9 ( #1994 )
2022-01-25 11:51:48 -08:00
Henry Beberman
ba4fb30966
[dev] Fix moby-containerd CVE-2021-41103 ( #1494 )
2021-10-06 10:33:38 -07:00
jslobodzian
17b0e93e71
Merge 1.0 to dev branch
...
This merge brings the latest SELinux and many packages and CVE fixes from the 1.0 branch.
2021-08-19 13:46:51 -07:00
Andrew Phelps
819786cad8
Increment release for all specs building with golang 1.15 ( #460 )
...
* bump release for specs building with golang 1.15
* changelog cleanup
2020-12-10 23:09:35 -08:00
Jon Slobodzian
b877013b27
Initial CBL-Mariner commit to GitHub
2020-08-06 20:17:52 -07:00