Skip to content

Commit 2a9e768

Browse files
committed
CHANGELOG: forward-port 1.1.9-1.1.12 changes
Signed-off-by: Rodrigo Campos <[email protected]>
1 parent 1950892 commit 2a9e768

File tree

1 file changed

+76
-0
lines changed

1 file changed

+76
-0
lines changed

CHANGELOG.md

Lines changed: 76 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,82 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
4747
* Remove tun/tap from the default device rules. (#3468)
4848
* specconv: avoid mapping "acl" to MS_POSIXACL. (#3739)
4949

50+
## [1.1.12] - 2024-01-31
51+
52+
> Now you're thinking with Portals™!
53+
54+
### Security
55+
56+
* Fix [CVE-2024-21626][cve-2024-21626], a container breakout attack that took
57+
advantage of a file descriptor that was leaked internally within runc (but
58+
never leaked to the container process). In addition to fixing the leak,
59+
several strict hardening measures were added to ensure that future internal
60+
leaks could not be used to break out in this manner again. Based on our
61+
research, while no other container runtime had a similar leak, none had any
62+
of the hardening steps we've introduced (and some runtimes would not check
63+
for any file descriptors that a calling process may have leaked to them,
64+
allowing for container breakouts due to basic user error).
65+
66+
[cve-2024-21626]: https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv
67+
68+
## [1.1.11] - 2024-01-01
69+
70+
> Happy New Year!
71+
72+
### Fixed
73+
74+
* Fix several issues with userns path handling. (#4122, #4124, #4134, #4144)
75+
76+
### Changed
77+
78+
* Support memory.peak and memory.swap.peak in cgroups v2.
79+
Add `swapOnlyUsage` in `MemoryStats`. This field reports swap-only usage.
80+
For cgroupv1, `Usage` and `Failcnt` are set by subtracting memory usage
81+
from memory+swap usage. For cgroupv2, `Usage`, `Limit`, and `MaxUsage`
82+
are set. (#4000, #4010, #4131)
83+
* build(deps): bump github.com/cyphar/filepath-securejoin. (#4140)
84+
85+
## [1.1.10] - 2023-10-31
86+
87+
> Śruba, przykręcona we śnie, nie zmieni sytuacji, jaka panuje na jawie.
88+
89+
### Added
90+
91+
* Support for `hugetlb.<pagesize>.rsvd` limiting and accounting. Fixes the
92+
issue of postres failing when hugepage limits are set. (#3859, #4077)
93+
94+
### Fixed
95+
96+
* Fixed permissions of a newly created directories to not depend on the value
97+
of umask in tmpcopyup feature implementation. (#3991, #4060)
98+
* libcontainer: cgroup v1 GetStats now ignores missing `kmem.limit_in_bytes`
99+
(fixes the compatibility with Linux kernel 6.1+). (#4028)
100+
* Fix a semi-arbitrary cgroup write bug when given a malicious hugetlb
101+
configuration. This issue is not a security issue because it requires a
102+
malicious `config.json`, which is outside of our threat model. (#4103)
103+
* Various CI fixes. (#4081, #4055)
104+
105+
## [1.1.9] - 2023-08-10
106+
107+
> There is a crack in everything. That's how the light gets in.
108+
109+
### Added
110+
111+
* Added go 1.21 to the CI matrix; other CI updates. (#3976, #3958)
112+
113+
### Fixed
114+
115+
* Fixed losing sticky bit on tmpfs (a regression in 1.1.8). (#3952, #3961)
116+
* intelrdt: fixed ignoring ClosID on some systems. (#3550, #3978)
117+
118+
### Changed
119+
120+
* Sum `anon` and `file` from `memory.stat` for cgroupv2 root usage,
121+
as the root does not have `memory.current` for cgroupv2.
122+
This aligns cgroupv2 root usage more closely with cgroupv1 reporting.
123+
Additionally, report root swap usage as sum of swap and memory usage,
124+
aligned with v1 and existing non-root v2 reporting. (#3933)
125+
50126
## [1.1.8] - 2023-07-20
51127

52128
> 海纳百川 有容乃大

0 commit comments

Comments
 (0)