@@ -23,6 +23,95 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
23
23
methods no longer ignore ` Process.IOPriority ` and ` Process.Scheduler `
24
24
settings. (#4585 )
25
25
26
+ ## [ 1.2.5] - 2025-02-13
27
+
28
+ > Мороз и солнце; день чудесный!
29
+
30
+ ### Fixed
31
+ * There was a regression in systemd v230 which made the way we define device
32
+ rule restrictions require a systemctl daemon-reload for our transient
33
+ units. This caused issues for workloads using NVIDIA GPUs. Workaround the
34
+ upstream regression by re-arranging how the unit properties are defined.
35
+ (#4568 , #4612 , #4615 )
36
+ * Dependency github.com/cyphar/filepath-securejoin is updated to v0.4.1,
37
+ allowing projects that vendor runc to bump it as well. (#4608 )
38
+ * CI: fixed criu-dev compilation. (#4611 )
39
+
40
+ ### Changed
41
+ * Dependency golang.org/x/net is updated to 0.33.0. (#4632 )
42
+
43
+ ## [ 1.2.4] - 2025-01-07
44
+
45
+ > Христос се роди!
46
+
47
+ ### Fixed
48
+ * Re-add tun/tap devices to built-in allowed devices lists.
49
+
50
+ In runc 1.2.0 we removed these devices from the default allow-list (which
51
+ were added seemingly by accident early in Docker's history) as a precaution
52
+ in order to try to reduce the attack surface of device inodes available to
53
+ most containers (#3468 ). At the time we thought that the vast majority of
54
+ users using tun/tap would already be specifying what devices they need (such
55
+ as by using ` --device ` with Docker/Podman) as opposed to doing the ` mknod `
56
+ manually, and thus there would've been no user-visible change.
57
+
58
+ Unfortunately, it seems that this regressed a noticeable number of users
59
+ (and not all higher-level tools provide easy ways to specify devices to
60
+ allow) and so this change needed to be reverted. Users that do not need
61
+ these devices are recommended to explicitly disable them by adding deny
62
+ rules in their container configuration. (#4555 , #4556 )
63
+
64
+ ## [ 1.2.3] - 2024-12-12
65
+
66
+ > Winter is not a season, it's a celebration.
67
+
68
+ ### Fixed
69
+ * Fixed a regression in use of securejoin.MkdirAll, where multiple
70
+ runc processes racing to create the same mountpoint in a shared rootfs
71
+ would result in spurious EEXIST errors. In particular, this regression
72
+ caused issues with BuildKit. (#4543 , #4550 )
73
+ * Fixed a regression in eBPF support for pre-5.6 kernels after upgrading
74
+ Cilium's eBPF library version to 0.16 in runc. (#3008 , #4551 )
75
+
76
+ ## [ 1.2.2] - 2024-11-15
77
+
78
+ > Specialization is for insects.
79
+
80
+ ### Fixed
81
+ * Fixed the failure of ` runc delete ` on a rootless container with no
82
+ dedicated cgroup on a system with read-only ` /sys/fs/cgroup ` mount.
83
+ This is a regression in runc 1.2.0, causing a failure when using
84
+ rootless buildkit. (#4518 , #4531 )
85
+ * Using runc on a system where /run/runc and /usr/bin are on different
86
+ filesystems no longer results in harmless but annoying messages
87
+ ("overlayfs: "xino" feature enabled using 3 upper inode bits")
88
+ appearing in the kernel log. (#4508 , #4530 )
89
+
90
+ ### Changed
91
+ * Better memfd-bind documentation. (#4530 )
92
+ * CI: bump Fedora 40 -> 41. (#4528 )
93
+
94
+ ## [ 1.2.1] - 2024-11-01
95
+
96
+ > No existe una escuela que enseñe a vivir.
97
+
98
+ ### Fixed
99
+ * Became root after joining an existing user namespace. Otherwise, runc
100
+ won't have permissions to configure some mounts when running under
101
+ SELinux and runc is not creating the user namespace. (#4466 , #4477 )
102
+
103
+ ### Removed
104
+ * Remove dependency on ` golang.org/x/sys/execabs ` from go.mod. (#4480 )
105
+ * Remove runc-dmz, that had many limitations, and is mostly made obsolete by
106
+ the new protection mechanism added in v1.2.0. Note that runc-dmz was only
107
+ available only in the 1.2.0 release and required to set an environment variable
108
+ to opt-in. (#4488 )
109
+
110
+ ### Added
111
+ * The ` script/check-config.sh ` script now checks for overlayfs support. (#4494 )
112
+ * When using cgroups v2, allow to set or update memory limit to "unlimited"
113
+ and swap limit to a specific value. (#4501 )
114
+
26
115
## [ 1.2.0] - 2024-10-22
27
116
28
117
> できるときにできることをやるんだ。それが今だ。
@@ -917,7 +1006,12 @@ implementation (libcontainer) is *not* covered by this policy.
917
1006
[ 1.1.0-rc.1 ] : https://github.com/opencontainers/runc/compare/v1.0.0...v1.1.0-rc.1
918
1007
919
1008
<!-- 1.2.z patch releases -->
920
- [ Unreleased 1.2.z ] : https://github.com/opencontainers/runc/compare/v1.2.0...release-1.2
1009
+ [ Unreleased 1.2.z ] : https://github.com/opencontainers/runc/compare/v1.2.5...release-1.2
1010
+ [ 1.2.5 ] : https://github.com/opencontainers/runc/compare/v1.2.4...v1.2.5
1011
+ [ 1.2.4 ] : https://github.com/opencontainers/runc/compare/v1.2.3...v1.2.4
1012
+ [ 1.2.3 ] : https://github.com/opencontainers/runc/compare/v1.2.2...v1.2.3
1013
+ [ 1.2.2 ] : https://github.com/opencontainers/runc/compare/v1.2.1...v1.2.2
1014
+ [ 1.2.1 ] : https://github.com/opencontainers/runc/compare/v1.2.0...v1.2.1
921
1015
[ 1.2.0-rc.3 ] : https://github.com/opencontainers/runc/compare/v1.2.0-rc.2...v1.2.0-rc.3
922
1016
[ 1.2.0-rc.2 ] : https://github.com/opencontainers/runc/compare/v1.2.0-rc.1...v1.2.0-rc.2
923
1017
[ 1.2.0-rc.1 ] : https://github.com/opencontainers/runc/compare/v1.1.0...v1.2.0-rc.1
0 commit comments