Debian Patches

Status for containerd/1.7.24~ds1-10

Patch Description Author Forwarded Bugs Origin Last update
0001-disable-windows-support-in-ctr-metric.patch disable windows support in ctr metric Shengjing Zhu <zhsj@debian.org> not-needed 2020-09-16
0002-disable-runhcs-option-in-cri-config.patch disable runhcs option in cri config Shengjing Zhu <zhsj@debian.org> not-needed 2021-01-23
0003-Disable-opentelemetry.patch Disable opentelemetry
go.opentelemetry.io/contrib is not packaged.
Shengjing Zhu <zhsj@debian.org> not-needed 2022-02-21
0005-go.mod-github.com-containerd-go-runc-v1.1.0.patch go.mod: github.com/containerd/go-runc v1.1.0 Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp> no 2023-05-17
0006-Add-Debian-specific-CNI-bin-dir-to-ctr-run-command.patch Add Debian specific CNI bin dir to ctr run command Shengjing Zhu <zhsj@debian.org> not-needed 2022-03-01
0007-Allow-running-tests-with-unshare-1.patch Allow running tests with unshare(1) Debian Go Packaging Team <team+pkg-go@tracker.debian.org> yes debian 2024-06-30
0009-Skip-some-tests-that-fail-in-Debian.patch Skip some tests that fail in Debian Reinhard Tartler <siretart@tauware.de> no 2024-08-10
0010-Avoid-dependency-on-component-base.patch Avoid dependency on component-base
only used for integration tests
Reinhard Tartler <siretart@tauware.de> no 2024-09-01
0011-Add-missing-sources-for-containerd-zfs-aufs.patch Add missing sources for containerd/{zfs,aufs} Reinhard Tartler <siretart@tauware.de> not-needed 2024-09-28
0012-stub-cri-api-RuntimeConfig.patch add "unimplemented" stubs for RuntimeConfig method required by new k8s upstream "cri-api" Tianon Gravi <tianon@debian.org> no 2025-08-13
0013-CVE-2024-40635.patch validate uid/gid
(cherry picked from commit 11504c3fc5f45634f2d93d57743a998194430b82)
Craig Ingram <Cjingram@google.com> no 2025-03-07
0012-oci-utils_unix_test.go-Cover-for-incus-lxd-test-fail.patch oci/utils_unix_test.go: Cover for incus/lxd test failures Reinhard Tartler <siretart@tauware.de> no 2025-08-14
0013-Fix-directory-permissions.patch Fix directory permissions
- Create /var/lib/containerd with 0o700 (was: 0o711).
- Create config.TempDir with 0o700 (was: 0o711).
- Create /run/containerd/io.containerd.grpc.v1.cri with 0o700 (was: 0o755).
- Create /run/containerd/io.containerd.sandbox.controller.v1.shim with 0o700 (was: 0o711).
- Leave /run/containerd and /run/containerd/io.containerd.runtime.v2.task created with 0o711,
as required by userns-remapped containers.
/run/containerd/io.containerd.runtime.v2.task/<NS>/<ID> is created with:
- 0o700 for non-userns-remapped containers
- 0o710 for userns-remapped containers with the remapped root group as the owner group.

(cherry picked from commit 51b0cf11dc5af7ed1919beba259e644138b28d96)
Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp> no 2025-10-27
0014-fix-goroutine-leak-of-container-Attach.patch fix goroutine leak of container Attach
The monitor goroutine (runs (*ContainerIO).Attach.func1) of Attach will
never finish if it attaches to a container without any stdout or stderr
output. Wait for http context cancel and break the pipe actively to
address the issue.

(cherry picked from commit a0d0f0ef68935338d2c710db164fa7820f692530)
wheat2018 <1151937289@qq.com> no 2024-08-13

All known versions for source package 'containerd'

Links