Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
[1.4.0] - 2025-11-27
Deprecated
CleanPath,StripRoot,WithProcfd, andWithProcfdFilefromlibcontainer/utils. (pathrs: add "hallucination" helpers for SecureJoin magic #4985)Breaking
pids.limithas been updated to match the newer guidancefrom the OCI runtime specification. In particular, now a maximum limit value
of
0will be treated as an actual limit (due to limitations with systemd,it will be treated the same as a limit value of
1). We only expect usersthat explicitly set
pids.limitto0will see a behaviour change.(config: switch PidsLimit to *int64 cgroups#48, runtime-spec: update pids.limit handling to match new guidance #4949)
Fixed
(systemd: retry when the dbus connection returns EAGAIN cgroups#45)
cpuacct.usage_allresilience when parsing data frompatched kernels (such as the Tencent kernels). (kubelet fails to start due to cgroups CPU stat parsing failed in k8s 1.34 cgroups#46,
fs: fix/improve cpuacct.usage_all parsing cgroups#50)
prepareCgroupFDerror. ([1.4] libct: close child fds on prepareCgroupFD error #4936)tmpfsmount, only set themode=argument if the targetpath already existed. This fixes a regression introduced in our
CVE-2025-52881 mitigation patches. (Recent security update changed default permissions of tmpfs #4971, [1.4] rootfs: only set mode= for tmpfs mount if target already existed #4976)
comprehensively as possible. ([v1.3.3] Error response from daemon: failed to create task for container #5007, [1.2.8] runc appears to apply rlimits to itself prior to validating device nodes #5021, [1.4] fix fd leaks and detect them as comprehensively as possible #5034)
mitigation have been made more generic and now apply to all of our
pathrshelper functions, which should ensure we will not regress dangling symlink
users. (pathrs: add "hallucination" helpers for SecureJoin magic #4985)
Changed
(*CPUSet).Fill. ([1.4] libct: switch to (*CPUSet).Fill #4927)