[ubuntu/wily-proposed] docker.io 1.6.2~dfsg1-1ubuntu1 (Accepted)
Pierre-Andre MOREY
pierre-andre.morey at canonical.com
Fri May 29 13:29:26 UTC 2015
docker.io (1.6.2~dfsg1-1ubuntu1) wily; urgency=medium
[ Pierre-André MOREY ]
* Merge from Debian unstable. Remaining changes:
- d/control: bump minimum version of golang-pty-dev for broader
architecture support.
- d/{control,rules}: use gccgo instead of golang to enable builds on
ppc64el, powerpc and arm64.
- System call number updates:
+ d/p/arm64-support.patch
+ d/p/arm-syscall-fix.patch
+ d/p/powerpc-support.patch
* d/p/sync-apparmor-with-lxc.patch replaced by
sync-apparmor-with-lxc.2.patch: update AppArmor policy to be in sync with LXC.
docker.io (1.6.2~dfsg1-1) unstable; urgency=medium
* Update to 1.6.2 upstream release
* Update deps in d/control to match upstream's hack/vendor.sh specifications
docker.io (1.6.1+dfsg1-2) unstable; urgency=medium
* Add --no-restart-on-upgrade to dh_installinit so that we don't force
a stop on upgrade, which can cause other units to fall over. Many thanks
to Michael Stapelberg (sECuRE) for the tip!
docker.io (1.6.1+dfsg1-1) unstable; urgency=high
* Update to 1.6.1 upstream release (Closes: #784726)
- CVE-2015-3627
Insecure opening of file-descriptor 1 leading to privilege escalation
- CVE-2015-3629
Symlink traversal on container respawn allows local privilege escalation
- CVE-2015-3630
Read/write proc paths allow host modification & information disclosure
- CVE-2015-3631
Volume mounts allow LSM profile escalation
Date: Fri, 29 May 2015 11:45:26 +0000
Changed-By: Pierre-André MOREY <pierre-andre.morey at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Robie Basak <robie.basak at canonical.com>
https://launchpad.net/ubuntu/+source/docker.io/1.6.2~dfsg1-1ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Fri, 29 May 2015 11:45:26 +0000
Source: docker.io
Binary: docker.io vim-syntax-docker golang-docker-dev
Architecture: source
Version: 1.6.2~dfsg1-1ubuntu1
Distribution: wily
Urgency: high
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Pierre-André MOREY <pierre-andre.morey at canonical.com>
Description:
docker.io - Linux container runtime
golang-docker-dev - Externally reusable Go packages included with Docker
vim-syntax-docker - Docker container engine - Vim highlighting syntax files
Closes: 784726
Changes:
docker.io (1.6.2~dfsg1-1ubuntu1) wily; urgency=medium
.
[ Pierre-André MOREY ]
* Merge from Debian unstable. Remaining changes:
- d/control: bump minimum version of golang-pty-dev for broader
architecture support.
- d/{control,rules}: use gccgo instead of golang to enable builds on
ppc64el, powerpc and arm64.
- System call number updates:
+ d/p/arm64-support.patch
+ d/p/arm-syscall-fix.patch
+ d/p/powerpc-support.patch
* d/p/sync-apparmor-with-lxc.patch replaced by
sync-apparmor-with-lxc.2.patch: update AppArmor policy to be in sync with LXC.
.
docker.io (1.6.2~dfsg1-1) unstable; urgency=medium
.
* Update to 1.6.2 upstream release
* Update deps in d/control to match upstream's hack/vendor.sh specifications
.
docker.io (1.6.1+dfsg1-2) unstable; urgency=medium
.
* Add --no-restart-on-upgrade to dh_installinit so that we don't force
a stop on upgrade, which can cause other units to fall over. Many thanks
to Michael Stapelberg (sECuRE) for the tip!
.
docker.io (1.6.1+dfsg1-1) unstable; urgency=high
.
* Update to 1.6.1 upstream release (Closes: #784726)
- CVE-2015-3627
Insecure opening of file-descriptor 1 leading to privilege escalation
- CVE-2015-3629
Symlink traversal on container respawn allows local privilege escalation
- CVE-2015-3630
Read/write proc paths allow host modification & information disclosure
- CVE-2015-3631
Volume mounts allow LSM profile escalation
Checksums-Sha1:
212c1390f6183f3ba0efc69b3ee241ff0719d62b 3745 docker.io_1.6.2~dfsg1-1ubuntu1.dsc
9aff8d4d4ec457b6ee29aed9d07de6763101a7d1 210099 docker.io_1.6.2~dfsg1.orig-distribution.tar.gz
c80619640f231e5f08abf3466a3caab1b5075ef9 107250 docker.io_1.6.2~dfsg1.orig-libcontainer.tar.gz
e4725cd68c29f95d3c50f9957a742d576823a0fa 34014 docker.io_1.6.2~dfsg1.orig-libtrust.tar.gz
fccfc1a3709198a8ab730a59034db91a85dba08a 825935 docker.io_1.6.2~dfsg1.orig.tar.gz
b7f51ac36c196bfca84129d2d6ffb0e8effdefee 20096 docker.io_1.6.2~dfsg1-1ubuntu1.debian.tar.xz
Checksums-Sha256:
f3c494b8a50905da513eda422aff79eec4ff6459bf603702e03d412e7351b278 3745 docker.io_1.6.2~dfsg1-1ubuntu1.dsc
ebe3c3fa21446bd5e082919b6d59bef420fdf1d551f686e9863eb9fef75a8b23 210099 docker.io_1.6.2~dfsg1.orig-distribution.tar.gz
5b5bc58533808736a51c1359d2b28424731d92e049ba6e638d8c525f31f060b6 107250 docker.io_1.6.2~dfsg1.orig-libcontainer.tar.gz
9a9fd6855f9f8ea1b51e3a2865d3d50ad351b4fdc56af5d12653a6a40b53e084 34014 docker.io_1.6.2~dfsg1.orig-libtrust.tar.gz
eabba3fc2da78956e3ac87bdc3d3543730cd9eaa0289077a777d3a7560b4b6f8 825935 docker.io_1.6.2~dfsg1.orig.tar.gz
43061803e3a22dfe14ef67a804db06592f1ade52e8a28f8a926418ccb670b450 20096 docker.io_1.6.2~dfsg1-1ubuntu1.debian.tar.xz
Files:
3fa24ec8e25ac393a0ccd26d3de5a712 3745 admin optional docker.io_1.6.2~dfsg1-1ubuntu1.dsc
5942f07307bd970462e016179d965780 210099 admin optional docker.io_1.6.2~dfsg1.orig-distribution.tar.gz
4ba5596d922cacd00592fe1d4a7109f8 107250 admin optional docker.io_1.6.2~dfsg1.orig-libcontainer.tar.gz
c3e8cd90a2a683e46a9bfe22a0e301eb 34014 admin optional docker.io_1.6.2~dfsg1.orig-libtrust.tar.gz
f029a47637ea33bd7cf2a11c59c1b0fa 825935 admin optional docker.io_1.6.2~dfsg1.orig.tar.gz
eaff755c97d34a9cddd50ada4ec453b9 20096 admin optional docker.io_1.6.2~dfsg1-1ubuntu1.debian.tar.xz
Original-Maintainer: Paul Tagliamonte <paultag at debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIcBAEBCgAGBQJVaGljAAoJEOVkucJ1vdUuh5UP/iKOpBIIpkBAq02OldvarqWk
TzjOx2qPRpZ1y4Y1MiI43zXp5H4grK56Ppm5Qmk1dz6lk/gGxNYZdbkEyPayyNHi
1wVglO5xF+UUu/skM4JQ+DNhSpMW6BFUwFCCSuYKzgkd5knuyaZ/mWlQDuvE7XnI
H3PhPoWSNosaWTvhuzi/2ROAHxKmPf0vvbWwPA15hMOc/amFICNbCSTeZyp0f6cW
48Cz/V1R9PCKA5OsKW8ysbtZhjmLQx9r24aWyeXlgngtiRFbgbiyNdKRxD1rAblB
ihqRjGUg3V1PVkfK7yHnmtCj32myOszjXVdnfwzwEluxUqUwe1Uo/OKZqAepZjw2
o60TXWaek7ly/iCE9ncZd/8zf9d06EDaExBiDu3+q+C+bI1SuOwTHXVr+EEzaJdw
ANXX/osIuj0XezO/S6APMytVXZfdjpvxSNv3kn3MZdpyHDOdcva/1HSo8YBsfvc2
oPmPRr+EtSPxIUzoez+MsPms/5R7Ux8Tr2mXMDCT2X078tvpeRZlZzdC4UY7wXmp
glXOOiWAWQ/2io7JdqVx9GP/+O7jZKbMIAS0kP+YBNrKmm9IIzgyTbuWawa5LNmp
9zXgY7fo8YrX7sVnrMODl6cI3CbCdDQ2rZV0PypWVgGZkzK/zG4I7nNngmcfHOB/
WnS303B89MDCA0J8mjZU
=snQ/
-----END PGP SIGNATURE-----
More information about the Wily-changes
mailing list