containerd (1.2.6-0ubuntu1~16.04.6+esm1) xenial-security; urgency=medium

  * SECURITY UPDATE: Insecure handling of image volumes
    - debian/patches/CVE-2022-23648.patch: Use fs.RootPath when mounting
    volumes.
    - debian/patches/update_cri_to_release_1_4.patch: Update CRI to 1.4.
    - CVE-2022-23648

containerd (1.2.6-0ubuntu1~16.04.6) xenial; urgency=medium

  * d/control: add a Breaks for docker.io lower than 18.09.7-0ubuntu1~16.04.7
    (LP: #1870514). The previous versions stop the docker daemon when a
    containerd update is performed, this Breaks statement will make sure we
    have a newer version which has the appropriate fix.

containerd (1.2.6-0ubuntu1~16.04.5) xenial-security; urgency=medium

  * SECURITY UPDATE: Elevation of privilege vulnerability
    - debian/patches/Add-runc.v2-multi-shim_partial2.patch: Add runc.v2
      multi-shim (partially).
    - debian/patches/horten-the-unix-socket-path-for-shim.patch: horten the
      unix socket path for shim.
    - debian/patches/Include-extension-for-shim-binary-format-on-Windows.patch:
      Include extension for shim binary format.
    - debian/patches/CVE-2020-15257.patch: Use path based unix socket for shims
      and use path-based unix socket for containerd-shim.
    - CVE-2020-15257

Date: 2022-02-25 20:45:10.576240+00:00
Changed-By: Paulo Flabiano Smorigo <pfsmor...@canonical.com>
https://launchpad.net/ubuntu/+source/containerd/1.2.6-0ubuntu1~16.04.6+esm1
Sorry, changesfile not available.
-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes

Reply via email to