Debian Patches
Status for incus/6.0.5-6
| Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
|---|---|---|---|---|---|---|
| 001-skip-TestConvertNetworkConfig.patch | lxc prior to version 4.0.12 had a logic bug in do_lxcapi_create() that returned success in error conditions. Since this is a very simple test, that didn’t actually matter, but now to properly pass would require the setting up of a user-specific lxc configuration and sub[u|g]id mappings, which is just too much effort for a small test.diff --git a/cmd/lxc-to-incus/main_migrate_test.go b/cmd/lxc-to-incus/main_migrate_test.go index 6fbff5fce..d3783b998 100644 |
Mathias Gibbens <gibmat@debian.org> | not-needed | |||
| 002-adjust-import-paths.patch | Adjust import paths to reflect Debian packagingdiff --git a/cmd/incusd/daemon.go b/cmd/incusd/daemon.go index 139fe549b..59f347c02 100644 |
Mathias Gibbens <gibmat@debian.org> | not-needed | |||
| 003-Compile-against-go-criu-v7.patch | Compile against go-criu v7 | Reinhard Tartler <siretart@tauware.de> | no | 2024-08-08 | ||
| 004-include-incusos-network-structs.patch | Incus now consumes the IncusOS network API. This causes a dependency loop, so extract the relevant structs needed by Incus.diff --git a/cmd/incusd/networks.go b/cmd/incusd/networks.go index f6ea927ca..7a1b93ce1 100644 |
Mathias Gibbens <gibmat@debian.org> | not-needed | |||
| 005-revert-4e828ca.patch | Temporarily revert commit that broke running `incus exec` for VMsdiff --git a/cmd/incus-agent/dev_incus.go b/cmd/incus-agent/dev_incus.go index 9dbf0c175..bc64243b6 100644 |
Mathias Gibbens <gibmat@debian.org> | yes | |||
| 006-update-libovsdb-import-path.patch | [PATCH 1/4] internal/server/network: Update libovsdb import path | Mathias Gibbens <mathias.gibbens@futurfusion.io> | no | 2025-10-14 | ||
| 007-cherry-pick-fix-nested-docker.patch | [PATCH] incusd/apparmor/lxc: Don't bother with sys/proc protections when nesting enabled When nesting is enabled, it's possible for the container to get a clean copy of /proc or /sys mounted anywhere without AppArmor being able to mediate. So there's little point in trying to apply safety checks on top of the main /proc and /sys. On top of that, we've recently discovered that AppArmor doesn't properly handle file access relative to a file descriptor, causing a bunch of those checks to deny access when they shouldn't. Closes #2623 |
=?UTF-8?q?St=C3=A9phane=20Graber?= <stgraber@stgraber.org> | no | 2025-11-05 | ||
| 106a-GHSA-56mx-8g9f-5crf.patch | [PATCH] incusd/storage: Tighten storage pool volume permissions Closes #2641 |
=?UTF-8?q?St=C3=A9phane=20Graber?= <stgraber@stgraber.org> | no | 2025-11-09 | ||
| 106b-GHSA-56mx-8g9f-5crf.patch | [PATCH] incusd/patches: Re-apply storage permissions on update | =?UTF-8?q?St=C3=A9phane=20Graber?= <stgraber@stgraber.org> | no | 2025-11-09 | ||
| 106c-GHSA-56mx-8g9f-5crf.patch | [PATCH] incusd/patches: Fix incorrect error check in permission patch | =?UTF-8?q?St=C3=A9phane=20Graber?= <stgraber@stgraber.org> | no | 2025-11-10 |
All known versions for source package 'incus'
- 6.17.0-1~exp1 (experimental)
- 6.0.5-6 (sid, forky)
- 6.0.4-2+deb13u2 (trixie-security, trixie-proposed-updates)
- 6.0.4-2+deb13u2~bpo12+1 (bookworm-backports)
- 6.0.4-2+deb13u1 (trixie)
