Skip to content

Conversation

@dependabot
Copy link

@dependabot dependabot bot commented on behalf of github Dec 19, 2023

Bumps github.com/containerd/containerd from 1.4.12 to 1.6.26.

Release notes

Sourced from github.com/containerd/containerd's releases.

containerd 1.6.26

Welcome to the v1.6.26 release of containerd!

The twenty-sixth patch release for containerd 1.6 contains various fixes and updates.

Notable Updates

  • Fix windows default path overwrite issue (#9441)
  • Update push to inherit distribution sources from parent (#9453)
  • Mask /sys/devices/virtual/powercap path in runtime spec and deny in default apparmor profile (GHSA-7ww5-4wqc-m92c)

Deprecation Warnings

  • Emit deprecation warning for AUFS snapshotter usage (#9448)
  • Emit deprecation warning for v1 runtime usage (#9468)
  • Emit deprecation warning for CRI v1alpha1 usage (#9468)

See the changelog for complete list of changes

Please try out the release binaries and report any issues at https://github.com/containerd/containerd/issues.

Contributors

  • Samuel Karp
  • Derek McGowan
  • Kohei Tokunaga
  • Phil Estes
  • Bjorn Neergaard
  • Sebastiaan van Stijn
  • Brian Goff
  • Charity Kathure
  • Kazuyoshi Kato
  • Milas Bowman
  • Wei Fu
  • ruiwen-zhao

Changes

  • [release/1.6] Prepare release notes for v1.6.26 (#9490)
    • ac5c5d3e0 Prepare release notes for v1.6.26
  • Github Security Advisory GHSA-7ww5-4wqc-m92c
    • 02f07fe19 contrib/apparmor: deny /sys/devices/virtual/powercap
    • c94577e78 oci/spec: deny /sys/devices/virtual/powercap
  • [release/1.6] update to go1.20.12, test go1.21.5 (#9472)
    • 7cbdfc92e update to go1.20.12, test go1.21.5
    • 024b1cce6 update to go1.20.11, test go1.21.4
  • [release/1.6] Add cri-api v1alpha2 usage warning to all api calls (#9484)

... (truncated)

Commits
  • 3dd1e88 Merge pull request #9490 from dmcgowan/prepare-1.6.26
  • 746b910 Merge pull request from GHSA-7ww5-4wqc-m92c
  • ac5c5d3 Prepare release notes for v1.6.26
  • e7ca005 Merge pull request #9472 from thaJeztah/1.6_update_golang_1.20.12
  • 7cbdfc9 update to go1.20.12, test go1.21.5
  • 024b1cc update to go1.20.11, test go1.21.4
  • 2e40459 Merge pull request #9484 from ruiwen-zhao/cri-api-warning-1.6
  • 64e56bf Add cri-api v1alpha2 usage warning to all api calls
  • c566b7d Merge pull request #9468 from samuelkarp/deprecation-warning-runtime-1.6
  • efefd3b tasks: emit warning for runc v1 runtime
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [github.com/containerd/containerd](https://github.com/containerd/containerd) from 1.4.12 to 1.6.26.
- [Release notes](https://github.com/containerd/containerd/releases)
- [Changelog](https://github.com/containerd/containerd/blob/main/RELEASES.md)
- [Commits](containerd/containerd@v1.4.12...v1.6.26)

---
updated-dependencies:
- dependency-name: github.com/containerd/containerd
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Dec 19, 2023
Copy link

@prisma-cloud-devsecops prisma-cloud-devsecops bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Prisma Cloud has found errors in this PR ⬇️

github.com/containerd/go-runc v1.0.0
github.com/containerd/typeurl v1.0.2
github.com/coreos/go-systemd/v22 v22.3.2
github.com/docker/docker v1.4.2-0.20190924003213-a8608b5b67c7

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

github.com/docker/docker v1.4.2-0.20190924003213-a8608b5b67c7 / go.mod

Total vulnerabilities: 2

Critical: 0 High: 0 Medium: 2 Low: 0
Vulnerability IDSeverityCVSSFixed inStatus
GHSA-jq35-85cj-fj4p MEDIUM MEDIUM 4 24.0.7 Open
CVE-2015-3627 MEDIUM MEDIUM 7.2 1.6.1 Open

github.com/zeebo/xxh3 v1.0.2 // indirect
go.opencensus.io v0.24.0 // indirect
go.uber.org/atomic v1.4.0 // indirect
golang.org/x/crypto v0.14.0 // indirect

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

golang.org/x/crypto v0.14.0 / go.mod

Total vulnerabilities: 1

Critical: 0 High: 0 Medium: 1 Low: 0
Vulnerability IDSeverityCVSSFixed inStatus
CVE-2023-48795 MEDIUM MEDIUM 5.9 0.17.0 Open

github.com/containerd/log v0.1.0 // indirect
github.com/containerd/ttrpc v1.1.2 // indirect
github.com/davecgh/go-spew v1.1.1 // indirect
github.com/docker/distribution v2.7.1+incompatible // indirect

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

github.com/docker/distribution v2.7.1+incompatible / go.mod

Total vulnerabilities: 2

Critical: 0 High: 1 Medium: 0 Low: 1
Vulnerability IDSeverityCVSSFixed inStatus
CVE-2023-2253 HIGH HIGH 7.5 2.8.2-beta.1 Open
GHSA-qq97-vm5h-rrhg LOW LOW 3 2.8.0 Open

go 1.17

require (
cloud.google.com/go/bigquery v1.52.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

github.com/apache/arrow/go/v12 v12.0.0 / go.mod

MEDIUM  Noncompliant License (BSL-1.0)

This package contains a license that is not OSI-approved.

go 1.17

require (
cloud.google.com/go/bigquery v1.52.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

github.com/apache/arrow/go/v12 v12.0.0 / go.mod

MEDIUM  Noncompliant License (CC-BY-3.0)

This package contains a license that is not OSI-approved.

go 1.17

require (
cloud.google.com/go/bigquery v1.52.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

github.com/apache/arrow/go/v12 v12.0.0 / go.mod

MEDIUM  Noncompliant License (OpenSSL)

This package contains a license that is not OSI-approved.

@guardrails
Copy link

guardrails bot commented Dec 19, 2023

⚠️ We detected 21 security issues in this pull request:

Vulnerable Libraries (21)
Severity Details
High pkg:golang/golang.org/x/oauth2@v0.10.0 upgrade to: > v0.10.0
High pkg:golang/google.golang.org/grpc@v1.58.3 upgrade to: > v1.58.3
Critical pkg:golang/github.com/containerd/containerd@v1.6.26 upgrade to: > v1.6.26
Critical pkg:golang/k8s.io/api@v0.22.5 upgrade to: > v0.22.5
High pkg:golang/honnef.co/go/tools@v0.0.1-2020.1.3 upgrade to: > v0.0.1-2020.1.3
High pkg:golang/google.golang.org/api@v0.126.0 upgrade to: > v0.126.0
High pkg:golang/github.com/sirupsen/logrus@v1.9.3 upgrade to: > v1.9.3
Medium pkg:golang/github.com/google/pprof@v0.0.0-20200430221834-fc25d7d30c6d upgrade to: > v0.0.0-20200430221834-fc25d7d30c6d
Medium pkg:golang/github.com/cilium/ebpf@v0.7.0 upgrade to: > v0.7.0
Critical pkg:golang/k8s.io/client-go@v0.22.5 upgrade to: > v0.22.5
High pkg:golang/cloud.google.com/go/bigquery@v1.52.0 upgrade to: > v1.52.0
Critical pkg:golang/k8s.io/apimachinery@v0.22.5 upgrade to: > v0.22.5
High pkg:golang/github.com/containerd/cgroups@v1.0.4 upgrade to: > v1.0.4
High pkg:golang/github.com/google/gopacket@v1.1.19 upgrade to: > v1.1.19
High pkg:golang/github.com/golang/mock@v1.6.0 upgrade to: > v1.6.0
Medium pkg:golang/github.com/vishvananda/netlink@v1.1.1-0.20210330154013-f5de75959ad5 upgrade to: > v1.1.1-0.20210330154013-f5de75959ad5
High pkg:golang/github.com/docker/docker@v1.4.2-0.20190924003213-a8608b5b67c7 upgrade to: 18.9.8
High pkg:golang/golang.org/x/tools@v0.9.1 upgrade to: > v0.9.1
High pkg:golang/golang.org/x/mod@v0.10.0 upgrade to: > v0.10.0
High pkg:golang/golang.org/x/net@v0.17.0 upgrade to: > v0.17.0
Medium pkg:golang/github.com/containerd/console@v1.0.3 upgrade to: > v1.0.3

More info on how to fix Vulnerable Libraries in Go.


👉 Go to the dashboard for detailed results.

📥 Happy? Share your feedback with us.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant