[ubuntu/wily-proposed] docker.io 1.6.2~dfsg1-1ubuntu1 (Accepted)

Pierre-Andre MOREY pierre-andre.morey at canonical.com
Fri May 29 13:29:26 UTC 2015


docker.io (1.6.2~dfsg1-1ubuntu1) wily; urgency=medium

  [ Pierre-André MOREY ]
  * Merge from Debian unstable. Remaining changes:
    - d/control: bump minimum version of golang-pty-dev for broader
      architecture support.
    - d/{control,rules}: use gccgo instead of golang to enable builds on
      ppc64el, powerpc and arm64.
    - System call number updates:
      + d/p/arm64-support.patch
      + d/p/arm-syscall-fix.patch
      + d/p/powerpc-support.patch
  * d/p/sync-apparmor-with-lxc.patch replaced by
    sync-apparmor-with-lxc.2.patch: update AppArmor policy to be in sync with LXC.

docker.io (1.6.2~dfsg1-1) unstable; urgency=medium

  * Update to 1.6.2 upstream release
  * Update deps in d/control to match upstream's hack/vendor.sh specifications

docker.io (1.6.1+dfsg1-2) unstable; urgency=medium

  * Add --no-restart-on-upgrade to dh_installinit so that we don't force
    a stop on upgrade, which can cause other units to fall over. Many thanks
    to Michael Stapelberg (sECuRE) for the tip!

docker.io (1.6.1+dfsg1-1) unstable; urgency=high

  * Update to 1.6.1 upstream release (Closes: #784726)
    - CVE-2015-3627
      Insecure opening of file-descriptor 1 leading to privilege escalation
    - CVE-2015-3629
      Symlink traversal on container respawn allows local privilege escalation
    - CVE-2015-3630
      Read/write proc paths allow host modification & information disclosure
    - CVE-2015-3631
      Volume mounts allow LSM profile escalation

Date: Fri, 29 May 2015 11:45:26 +0000
Changed-By: Pierre-André MOREY <pierre-andre.morey at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Robie Basak <robie.basak at canonical.com>
https://launchpad.net/ubuntu/+source/docker.io/1.6.2~dfsg1-1ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 29 May 2015 11:45:26 +0000
Source: docker.io
Binary: docker.io vim-syntax-docker golang-docker-dev
Architecture: source
Version: 1.6.2~dfsg1-1ubuntu1
Distribution: wily
Urgency: high
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Pierre-André MOREY <pierre-andre.morey at canonical.com>
Description:
 docker.io  - Linux container runtime
 golang-docker-dev - Externally reusable Go packages included with Docker
 vim-syntax-docker - Docker container engine - Vim highlighting syntax files
Closes: 784726
Changes:
 docker.io (1.6.2~dfsg1-1ubuntu1) wily; urgency=medium
 .
   [ Pierre-André MOREY ]
   * Merge from Debian unstable. Remaining changes:
     - d/control: bump minimum version of golang-pty-dev for broader
       architecture support.
     - d/{control,rules}: use gccgo instead of golang to enable builds on
       ppc64el, powerpc and arm64.
     - System call number updates:
       + d/p/arm64-support.patch
       + d/p/arm-syscall-fix.patch
       + d/p/powerpc-support.patch
   * d/p/sync-apparmor-with-lxc.patch replaced by
     sync-apparmor-with-lxc.2.patch: update AppArmor policy to be in sync with LXC.
 .
 docker.io (1.6.2~dfsg1-1) unstable; urgency=medium
 .
   * Update to 1.6.2 upstream release
   * Update deps in d/control to match upstream's hack/vendor.sh specifications
 .
 docker.io (1.6.1+dfsg1-2) unstable; urgency=medium
 .
   * Add --no-restart-on-upgrade to dh_installinit so that we don't force
     a stop on upgrade, which can cause other units to fall over. Many thanks
     to Michael Stapelberg (sECuRE) for the tip!
 .
 docker.io (1.6.1+dfsg1-1) unstable; urgency=high
 .
   * Update to 1.6.1 upstream release (Closes: #784726)
     - CVE-2015-3627
       Insecure opening of file-descriptor 1 leading to privilege escalation
     - CVE-2015-3629
       Symlink traversal on container respawn allows local privilege escalation
     - CVE-2015-3630
       Read/write proc paths allow host modification & information disclosure
     - CVE-2015-3631
       Volume mounts allow LSM profile escalation
Checksums-Sha1:
 212c1390f6183f3ba0efc69b3ee241ff0719d62b 3745 docker.io_1.6.2~dfsg1-1ubuntu1.dsc
 9aff8d4d4ec457b6ee29aed9d07de6763101a7d1 210099 docker.io_1.6.2~dfsg1.orig-distribution.tar.gz
 c80619640f231e5f08abf3466a3caab1b5075ef9 107250 docker.io_1.6.2~dfsg1.orig-libcontainer.tar.gz
 e4725cd68c29f95d3c50f9957a742d576823a0fa 34014 docker.io_1.6.2~dfsg1.orig-libtrust.tar.gz
 fccfc1a3709198a8ab730a59034db91a85dba08a 825935 docker.io_1.6.2~dfsg1.orig.tar.gz
 b7f51ac36c196bfca84129d2d6ffb0e8effdefee 20096 docker.io_1.6.2~dfsg1-1ubuntu1.debian.tar.xz
Checksums-Sha256:
 f3c494b8a50905da513eda422aff79eec4ff6459bf603702e03d412e7351b278 3745 docker.io_1.6.2~dfsg1-1ubuntu1.dsc
 ebe3c3fa21446bd5e082919b6d59bef420fdf1d551f686e9863eb9fef75a8b23 210099 docker.io_1.6.2~dfsg1.orig-distribution.tar.gz
 5b5bc58533808736a51c1359d2b28424731d92e049ba6e638d8c525f31f060b6 107250 docker.io_1.6.2~dfsg1.orig-libcontainer.tar.gz
 9a9fd6855f9f8ea1b51e3a2865d3d50ad351b4fdc56af5d12653a6a40b53e084 34014 docker.io_1.6.2~dfsg1.orig-libtrust.tar.gz
 eabba3fc2da78956e3ac87bdc3d3543730cd9eaa0289077a777d3a7560b4b6f8 825935 docker.io_1.6.2~dfsg1.orig.tar.gz
 43061803e3a22dfe14ef67a804db06592f1ade52e8a28f8a926418ccb670b450 20096 docker.io_1.6.2~dfsg1-1ubuntu1.debian.tar.xz
Files:
 3fa24ec8e25ac393a0ccd26d3de5a712 3745 admin optional docker.io_1.6.2~dfsg1-1ubuntu1.dsc
 5942f07307bd970462e016179d965780 210099 admin optional docker.io_1.6.2~dfsg1.orig-distribution.tar.gz
 4ba5596d922cacd00592fe1d4a7109f8 107250 admin optional docker.io_1.6.2~dfsg1.orig-libcontainer.tar.gz
 c3e8cd90a2a683e46a9bfe22a0e301eb 34014 admin optional docker.io_1.6.2~dfsg1.orig-libtrust.tar.gz
 f029a47637ea33bd7cf2a11c59c1b0fa 825935 admin optional docker.io_1.6.2~dfsg1.orig.tar.gz
 eaff755c97d34a9cddd50ada4ec453b9 20096 admin optional docker.io_1.6.2~dfsg1-1ubuntu1.debian.tar.xz
Original-Maintainer: Paul Tagliamonte <paultag at debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=snQ/
-----END PGP SIGNATURE-----


More information about the Wily-changes mailing list