Skip to content

Tags

Tags give the ability to mark specific points in history as being important
  • upstream/1.6.6_ds1

    Upstream version 1.6.6~ds1
  • v1.6.6

    containerd 1.6.6
    
    Welcome to the v1.6.6 release of containerd!
    
    The sixth patch release for containerd 1.6 includes a fix for
    [GHSA-5ffw-gxpp-mxpf](https://github.com/containerd/containerd/security/advisories/GHSA-5ffw-gxpp-mxpf).
    
    ### Notable Updates
    
    * **Fix ExecSync handler to cap console output size** ([GHSA-5ffw-gxpp-mxpf](https://github.com/containerd/containerd/security/advisories/GHSA-5ffw-gxpp-mxpf))
    
    See the changelog for complete list of changes
    
    Please try out the release binaries and report any issues at
    https://github.com/containerd/containerd/issues.
    
    ### Contributors
    
    * Derek McGowan
    * Kazuyoshi Kato
    
    ### Changes
    <details><summary>4 commits</summary>
    <p>
    
    * Github Security Advisory [GHSA-5ffw-gxpp-mxpf](https://github.com/containerd/containerd/security/advisories/GHSA-5ffw-gxpp-mxpf)
      * [`61213742a`](https://github.com/containerd/containerd/commit/61213742a8e57458cd6432c46eee9dd35e0584c7) Prepare release notes for v1.6.6
      * [`f92068350`](https://github.com/containerd/containerd/commit/f92068350f189040a3bc41f9aa65994c8aba796a) Implicitly discard the input to drain the reader
      * [`2eb67213b`](https://github.com/containerd/containerd/commit/2eb67213b8ec38f5d7233cf0098763d9364e2a17) [release/1.6] Limit the response size of ExecSync
    </p>
    </details>
    
    ### Dependency Changes
    
    This release has no dependency changes
    
    Previous release can be found at [v1.6.5](https://github.com/containerd/containerd/releases/tag/v1.6.5)
    
  • v1.5.13

    containerd 1.5.13
    
    Welcome to the v1.5.13 release of containerd!
    
    The thirteenth patch release for containerd 1.5 includes a fix for
    [GHSA-5ffw-gxpp-mxpf](https://github.com/containerd/containerd/security/advisories/GHSA-5ffw-gxpp-mxpf).
    
    ### Notable Updates
    
    * **Fix ExecSync handler to cap console output size** ([GHSA-5ffw-gxpp-mxpf](https://github.com/containerd/containerd/security/advisories/GHSA-5ffw-gxpp-mxpf))
    
    See the changelog for complete list of changes
    
    Please try out the release binaries and report any issues at
    https://github.com/containerd/containerd/issues.
    
    ### Contributors
    
    * Derek McGowan
    * Kazuyoshi Kato
    
    ### Changes
    <details><summary>4 commits</summary>
    <p>
    
    * Github Security Advisory [GHSA-5ffw-gxpp-mxpf](https://github.com/containerd/containerd/security/advisories/GHSA-5ffw-gxpp-mxpf)
      * [`1ab043141`](https://github.com/containerd/containerd/commit/1ab043141f77a733cbb2437b857d6385feda368c) Prepare release notes for v1.5.13
      * [`b40a356cf`](https://github.com/containerd/containerd/commit/b40a356cfd9f0e5202da130f448f6c35b886ad04) Implicitly discard the input to drain the reader
      * [`943588b54`](https://github.com/containerd/containerd/commit/943588b54807f48ca545f7560a3def20501993de) [release/1.5] Limit the response size of ExecSync
    </p>
    </details>
    
    ### Dependency Changes
    
    This release has no dependency changes
    
    Previous release can be found at [v1.5.12](https://github.com/containerd/containerd/releases/tag/v1.5.12)
    
  • v1.6.5

    containerd 1.6.5
    
    Welcome to the v1.6.5 release of containerd!
    
    The fifth patch release for containerd 1.6 includes a few fixes and updated
    version of runc.
    
    ### Notable Updates
    
    * **Fix for older CNI plugins not reporting version** ([#7011](https://github.com/containerd/containerd/pull/7011))
    * **Fix mount path handling for CRI plugin on Windows** ([#6929](https://github.com/containerd/containerd/pull/6929))
    
    See the changelog for complete list of changes
    
    Please try out the release binaries and report any issues at
    https://github.com/containerd/containerd/issues.
    
    ### Contributors
    
    * Mike Brown
    * Sebastiaan van Stijn
    * Kazuyoshi Kato
    * Phil Estes
    * Wei Fu
    * Akihiro Suda
    * Derek McGowan
    * Paul S. Schweigert
    * Amit Barve
    * Daniel Canter
    * Kevin Parsons
    * Marc Schwind
    
    ### Changes
    <details><summary>26 commits</summary>
    <p>
    
    * Prepare release notes for v1.6.5 ([#7021](https://github.com/containerd/containerd/pull/7021))
      * [`185e87275`](https://github.com/containerd/containerd/commit/185e87275cce838776f91abaf34c4ad4af3bfa69) Prepare release notes for v1.6.5
    * [release/1.6] update golang to 1.17.11 ([#7013](https://github.com/containerd/containerd/pull/7013))
      * [`5c9c83d3e`](https://github.com/containerd/containerd/commit/5c9c83d3e0f03d86644c448d23dc67c7433a2410) [release/1.6] update golang to 1.17.11
    * [release/1.6] update go-cni/for cni update fixing plugins that don't respond with version ([#7011](https://github.com/containerd/containerd/pull/7011))
      * [`fdcdc27bc`](https://github.com/containerd/containerd/commit/fdcdc27bce9b6105b4afa70759498fed6efed97a) update go-cni/for cni update fixing plugins that don't respond with version
    * [release/1.6] archive: add human-readable hint to Lchown error ([#6985](https://github.com/containerd/containerd/pull/6985))
      * [`e33b9e709`](https://github.com/containerd/containerd/commit/e33b9e7091792c8f4db042f4d196b130ac412ec1) archive: add human-readable hint to Lchown error
    * [release/1.6] go.mod: Bump hcsshim to 0.9.3 ([#6968](https://github.com/containerd/containerd/pull/6968))
      * [`6eff5b6c0`](https://github.com/containerd/containerd/commit/6eff5b6c0e03bf792b232e3bf2603a2445e57bcf) [release/1.6] go.mod: Bump hcsshim to 0.9.3
    * [release/1.6] config: improve config v1 deprecation message ([#6980](https://github.com/containerd/containerd/pull/6980))
      * [`3bb5a9d19`](https://github.com/containerd/containerd/commit/3bb5a9d19f42b58bde83585a1cc7faa3e1d2e9b9) config: improve config v1 deprecation message
    * [release/1.6] update golang to 1.17.10, golang.org/x/sys v0.0.0-20220412211240-33da011f77ad ([#6927](https://github.com/containerd/containerd/pull/6927))
      * [`f1d2d9260`](https://github.com/containerd/containerd/commit/f1d2d9260a5d5e8ac46b803757007cb138383206) [release/1.6] vendor: golang.org/x/sys v0.0.0-20220412211240-33da011f77ad
      * [`9f99be51b`](https://github.com/containerd/containerd/commit/9f99be51ba3282f4ac90c574c926e81494973225) [release/1.6] update golang to 1.17.10
    * [release/1.6] Bug fix for mount path handling ([#6929](https://github.com/containerd/containerd/pull/6929))
      * [`70839a344`](https://github.com/containerd/containerd/commit/70839a344033dbb86ae152b30a747f9258527c9e) Bug fix for mount path handling
    * [release/1.6] Reverts removal of parallel run from critest ([#6942](https://github.com/containerd/containerd/pull/6942))
      * [`82a77be2d`](https://github.com/containerd/containerd/commit/82a77be2dd20790a14a1c96f21be41b8d597cc2e) reverts removal of parallel run from critest
    * [release/1.6 backport] update runc binary and vendor to v1.1.2 ([#6936](https://github.com/containerd/containerd/pull/6936))
      * [`246a1b42e`](https://github.com/containerd/containerd/commit/246a1b42e64337656992335bf9e81738cbec89cb) vendor: github.com/opencontainers/runc v1.1.2
      * [`43717e03a`](https://github.com/containerd/containerd/commit/43717e03aa5266702871b2ac3584bf949642443c) update runc binary to v1.1.2
    * [release/1.6] Allow git commands in Vagrantfile ([#6941](https://github.com/containerd/containerd/pull/6941))
      * [`06bdfeb67`](https://github.com/containerd/containerd/commit/06bdfeb675297ebd7406b7de94107b2dc74017ad) Allow git commands in Vagrantfile
    * [release/1.6] Update critools to v1.24 ([#6895](https://github.com/containerd/containerd/pull/6895))
      * [`1520bae0f`](https://github.com/containerd/containerd/commit/1520bae0f44e1a47f68807bd61065135f1560256) update critools to v1.24
    </p>
    </details>
    
    ### Changes from containerd/go-cni
    <details><summary>6 commits</summary>
    <p>
    
    * go.mod: update libcni to v1.1.1 ([#101](https://github.com/containerd/go-cni/pull/101))
      * [`cb645ef`](https://github.com/containerd/go-cni/commit/cb645efd5a911122fa150704930c1205b31c2308) go.mod: update libcni to v1.1.1
    * add in some serial setup tests; a little make cleanup ([#100](https://github.com/containerd/go-cni/pull/100))
      * [`42cfe0f`](https://github.com/containerd/go-cni/commit/42cfe0f8dcae8919832c955502b1e9de32282f94) add in some serial setup tests; a little make cleanup
    * Re-introduce serial network setup ([#99](https://github.com/containerd/go-cni/pull/99))
      * [`ee1a707`](https://github.com/containerd/go-cni/commit/ee1a707cb4d9c2a1a11e901fddd954ac7bc23494) Re-introduce serial network setup
    </p>
    </details>
    
    ### Dependency Changes
    
    * **github.com/Microsoft/hcsshim**        v0.9.2 -> v0.9.3
    * **github.com/containerd/go-cni**        v1.1.5 -> v1.1.6
    * **github.com/containernetworking/cni**  v1.1.0 -> v1.1.1
    * **github.com/opencontainers/runc**      v1.1.1 -> v1.1.2
    * **golang.org/x/sys**                    1d35b9e2eb4e -> 33da011f77ad
    
    Previous release can be found at [v1.6.4](https://github.com/containerd/containerd/releases/tag/v1.6.4)
    
  • v1.5.12

    containerd 1.5.12
    
    Welcome to the v1.5.12 release of containerd!
    
    The twelfth patch release for containerd 1.5 includes various fixes and updates
    along with an updated version of runc.
    
    ### Notable Updates
    
    * **Fix inotify fd leak when cgroup is deleted** ([#6961](https://github.com/containerd/containerd/pull/6961))
    * **Close fifos when container is deleted in CRI plugin** ([#6857](https://github.com/containerd/containerd/pull/6857))
    * **Update unpack to to respect MaxConcurrentDownloads** ([#6774](https://github.com/containerd/containerd/pull/6774))
    * **Monitor OOMKill instead of OOM in cgroupv2** ([#6735](https://github.com/containerd/containerd/pull/6735))
    * **Make the temp mount as ready only in container WithVolumes** ([#6729](https://github.com/containerd/containerd/pull/6729))
    * **Fix deadlock from abandoned transactions in native snapshotter** ([#6726](https://github.com/containerd/containerd/pull/6726))
    
    See the changelog for complete list of changes
    
    Please try out the release binaries and report any issues at
    https://github.com/containerd/containerd/issues.
    
    ### Contributors
    
    * Sebastiaan van Stijn
    * Phil Estes
    * Akihiro Suda
    * Derek McGowan
    * Wei Fu
    * Jeremi Piotrowski
    * Kazuyoshi Kato
    * Maksym Pavlenko
    * Miao Wang
    * Mike Brown
    * Alexey Ivanov
    * Brian Goff
    * Henry Wang
    * Michael Crosby
    * Qiutong Song
    * Samuel Ortiz
    * Tõnis Tiigi
    * chenxiaoyu
    * linrunlong
    * ningmingxiao
    * zounengren
    
    ### Changes
    <details><summary>34 commits</summary>
    <p>
    
    * Prepare release notes for v1.5.12 ([#7019](https://github.com/containerd/containerd/pull/7019))
      * [`5a55f1efc`](https://github.com/containerd/containerd/commit/5a55f1efcfb3f8775399f960e7b6bb5921b5699a) Prepare release notes for v1.5.12
    * [release/1.5] update golang to 1.17.11 ([#7014](https://github.com/containerd/containerd/pull/7014))
      * [`3f61d5ed4`](https://github.com/containerd/containerd/commit/3f61d5ed4fe148e506db79aabad08106cf12290d) [release/1.5] update golang to 1.17.11
    * [release/1.5] archive: add human-readable hint to Lchown error ([#6986](https://github.com/containerd/containerd/pull/6986))
      * [`f67de000d`](https://github.com/containerd/containerd/commit/f67de000dc26f34ae088d8db7c5d936375c6ba61) archive: add human-readable hint to Lchown error
    * [release/1.5] config: improve config v1 deprecation message ([#6981](https://github.com/containerd/containerd/pull/6981))
      * [`4c98768bd`](https://github.com/containerd/containerd/commit/4c98768bd4c6299c111eac04adf32597824a05f4) config: improve config v1 deprecation message
    * [release/1.5] upgrade containerd/cgroups to v1.0.3 ([#6961](https://github.com/containerd/containerd/pull/6961))
      * [`f890c79fd`](https://github.com/containerd/containerd/commit/f890c79fd4b0826fec2ff92c40d6107ddc2311ff) [release/1.5] upgrade containerd/cgroups to v1.0.3
    * [release/1.5] update golang to 1.17.10, golang.org/x/sys v0.0.0-20220412211240-33da011f77ad ([#6928](https://github.com/containerd/containerd/pull/6928))
      * [`9f6e1864c`](https://github.com/containerd/containerd/commit/9f6e1864cd367b6ea50280943637da665772603f) [release/1.5] vendor: golang.org/x/sys v0.0.0-20220412211240-33da011f77ad
      * [`c00476595`](https://github.com/containerd/containerd/commit/c00476595fb5f5ec65f4c6e2e943aea9ea15fd74) [release/1.5] update golang to 1.17.10
    * [release/1.5 backport] update runc binary to v1.1.2 ([#6935](https://github.com/containerd/containerd/pull/6935))
      * [`c2f793349`](https://github.com/containerd/containerd/commit/c2f7933497a06ddc407b1cd189cfeac49388f332) update runc binary to v1.1.2
    * [release/1.5] cherry-pick: Allow git commands in Vagrantfile ([#6943](https://github.com/containerd/containerd/pull/6943))
      * [`1f9900830`](https://github.com/containerd/containerd/commit/1f9900830a7f886c73cb50db6a8bb941b1b0b949) Allow git commands in Vagrantfile
    * [release/1.5] cri: close fifos when container is deleted ([#6857](https://github.com/containerd/containerd/pull/6857))
      * [`689b342c1`](https://github.com/containerd/containerd/commit/689b342c1d6a5388f149721a5afb55d03837b41d) cri: close fifos when container is deleted
    * [release/1.5] update golang to 1.17.9 ([#6824](https://github.com/containerd/containerd/pull/6824))
      * [`65aad9d93`](https://github.com/containerd/containerd/commit/65aad9d9326882909bb7fe4a19f6ec9bc1e0a079) [release/1.5] update golang to 1.17.9
    * [release/1.5] check for duplicate nspath possibilities ([#6814](https://github.com/containerd/containerd/pull/6814))
      * [`283058cd6`](https://github.com/containerd/containerd/commit/283058cd6973a51e0acb48557e03312887d9ba72) check for duplicate nspath possibilities
    * [release/1.5] fix #6054  MaxConcurrentDownloads is not effect when Unpack is true ([#6774](https://github.com/containerd/containerd/pull/6774))
      * [`4dbd0c851`](https://github.com/containerd/containerd/commit/4dbd0c851b9b0cb0d8b02c44d72c311a25a2512a) fix #6054 MaxConcurrentDownloads is not effect when Unpack is true
    * [release/1.5 backport] update runc binary to v1.1.1 ([#6770](https://github.com/containerd/containerd/pull/6770))
      * [`ef56dcafc`](https://github.com/containerd/containerd/commit/ef56dcafc32d67e750b89fdb5ee24d0c7ffa9608) update runc binary to v1.1.1
      * [`b8ab8dd3f`](https://github.com/containerd/containerd/commit/b8ab8dd3fbd5b7020fe29d6d26d8d6a987215f5a) update runc binary to v1.1.0
    * [release/1.5 backport] Make the temp mount as ready only in container WithVolumes ([#6729](https://github.com/containerd/containerd/pull/6729))
      * [`05b04a1a3`](https://github.com/containerd/containerd/commit/05b04a1a36da8c94bb6a7af639a3059d01bea5e4) Make the temp mount as ready only in container WithVolumes
    * [release/1.5 backport] native: fix deadlock from leaving transactions open ([#6726](https://github.com/containerd/containerd/pull/6726))
      * [`603ef55e0`](https://github.com/containerd/containerd/commit/603ef55e0e696b382ad08d83168d608f54f1b6e2) native: fix deadlock from leaving transactions open
    * [release/1.5 backport] cgroup2: monitor OOMKill instead of OOM to prevent missing container events ([#6735](https://github.com/containerd/containerd/pull/6735))
      * [`1c68f5037`](https://github.com/containerd/containerd/commit/1c68f50378b3562e7497d42973ba610945c4bc66) cgroup2: monitor OOMKill instead of OOM to prevent missing container OOM events
    </p>
    </details>
    
    ### Changes from containerd/cgroups
    <details><summary>33 commits</summary>
    <p>
    
    * v2: Fix inotify fd leak when cgroup is deleted ([#212](https://github.com/containerd/cgroups/pull/212))
      * [`a7d6888`](https://github.com/containerd/cgroups/commit/a7d6888aa30218c8aff15d979eb3f6aec0b7979c) v2: add test case for Manager.EventChan() behavior
      * [`cf1f978`](https://github.com/containerd/cgroups/commit/cf1f978b93bf784118d3ab7dec6a47b8204918c2) v2: flip error handling for readKVStat("memory.events") to reduce indentation
      * [`6a46df2`](https://github.com/containerd/cgroups/commit/6a46df25065d551a8d998495c34263354c84f2c1) v2: manager: factor out memory.events parsing
      * [`35b5b55`](https://github.com/containerd/cgroups/commit/35b5b55c686080de64facf127d6d6a5ca9a0fe6b) v2: Fix inotify leak when cgroup is deleted
    * fix Implicit memory aliasing in for loop ([#214](https://github.com/containerd/cgroups/pull/214))
      * [`182c3af`](https://github.com/containerd/cgroups/commit/182c3afa53b8cccce0611cca9dee46410c4f82f7) fix Implicit memory aliasing in for loop
    * Fix potential dirfd leak. ([#210](https://github.com/containerd/cgroups/pull/210))
      * [`17fece8`](https://github.com/containerd/cgroups/commit/17fece81870ef8aa1a31f05210b8f425e37038a0) Fix potential dirfd leak.
    * cgroup: Optionally add process and task to a subsystems subset ([#203](https://github.com/containerd/cgroups/pull/203))
      * [`80a7821`](https://github.com/containerd/cgroups/commit/80a7821536fc82757f390f8d65693074bd3ef8e4) cgroup: Optionally add process and task to a subsystems subset
    * replace pkg/errors from vendor ([#208](https://github.com/containerd/cgroups/pull/208))
      * [`0072297`](https://github.com/containerd/cgroups/commit/0072297e4547d623094fc68b0df41eef364d1747) replace pkg/errors from vendor
    * cgroup.go: avoid panic on nil interface ([#207](https://github.com/containerd/cgroups/pull/207))
      * [`d55de5d`](https://github.com/containerd/cgroups/commit/d55de5d2af9a3616eb758e393a2170a1421155c1) cgroup.go: avoid panic on nil interface
    * Improvements on cgroup v2 support ([#204](https://github.com/containerd/cgroups/pull/204))
      * [`73a8516`](https://github.com/containerd/cgroups/commit/73a8516e7f0f45fe9931d02cc57ff6059202f553) cgroupv2: reset lastErr to nil when subtree control is successfully written
      * [`2ca92c5`](https://github.com/containerd/cgroups/commit/2ca92c515038c7a30c1998dbe29a87873b98a3b3) cgroupv2: enable controllers before setting resources in NewChild()
    * v2: remove unimplemented errors and ErrorHandler, IgnoreNotExist ([#201](https://github.com/containerd/cgroups/pull/201))
      * [`db173a8`](https://github.com/containerd/cgroups/commit/db173a86bea843700360e7061c6f8d3869d13363) v2: remove ErrorHandler and IgnoreNotExist as they are not implemented
      * [`b19a60d`](https://github.com/containerd/cgroups/commit/b19a60d64d89b858b3c2bee4a04fb7f70642ffce) v2: remove errors that are never returned
    * v1: reduce duplicated code ([#202](https://github.com/containerd/cgroups/pull/202))
      * [`4fe70f3`](https://github.com/containerd/cgroups/commit/4fe70f3edc256fc2345d5f8f8a54e2f4e96f271e) v1: reduce duplicated code
    * cgroup v1: implement AddProc() ([#200](https://github.com/containerd/cgroups/pull/200))
      * [`6659093`](https://github.com/containerd/cgroups/commit/66590933215fb7b0c9f9ffd39e9946ab510d7679) cgroup v1: implement AddProc()
    * Rename branch from master to main ([#199](https://github.com/containerd/cgroups/pull/199))
      * [`7254c12`](https://github.com/containerd/cgroups/commit/7254c1242cee46d1c37bf3da2151eed571879b5c) Rename branch from master to main
    * utils: export ParseCgroupFile() ([#197](https://github.com/containerd/cgroups/pull/197))
      * [`23b5120`](https://github.com/containerd/cgroups/commit/23b51209bf7bd11941d5613119309b11029e8373) utils: export ParseCgroupFile()
    * go.mod: coreos/go-systemd/v22 v22.3.2 to prepare for deprecations ([#194](https://github.com/containerd/cgroups/pull/194))
      * [`f8918cf`](https://github.com/containerd/cgroups/commit/f8918cf2d923b7003970ce99bb29545f2f34b531) go.mod: coreos/go-systemd/v22 v22.3.2 to prepare for deprecations
    * Use /proc/partitions to get device names ([#195](https://github.com/containerd/cgroups/pull/195))
      * [`1a4509d`](https://github.com/containerd/cgroups/commit/1a4509dd06454dc765aed7f62cb26531416ffce3) Use /proc/partitions to get device names
    </p>
    </details>
    
    ### Dependency Changes
    
    * **github.com/containerd/cgroups**  v1.0.1 -> v1.0.3
    * **github.com/stretchr/testify**    v1.6.1 -> v1.7.0
    * **golang.org/x/net**               e18ecbb05110 -> a5a99cb37ef4
    * **golang.org/x/sync**              09787c993a3a -> 036812b2e83c
    * **golang.org/x/sys**               d19ff857e887 -> 33da011f77ad
    
    Previous release can be found at [v1.5.11](https://github.com/containerd/containerd/releases/tag/v1.5.11)
    
    
  • v1.6.4

    containerd 1.6.4
    
    Welcome to the v1.6.4 release of containerd!
    
    The fourth patch release for containerd 1.6 includes two fixes for CNI and SELinux.
    
    ### Notable Updates
    
    * **Update go-cni to fix teardown regression** ([#6877](https://github.com/containerd/containerd/pull/6877))
    * **Fix broken SELinux relabeling for Kubernetes volume mounts** ([#6878](https://github.com/containerd/containerd/pull/6878))
    
    See the changelog for complete list of changes
    
    Please try out the release binaries and report any issues at
    https://github.com/containerd/containerd/issues.
    
    ### Contributors
    
    * Mike Brown
    * Kazuyoshi Kato
    * Michael Zappa
    * Wang Bing
    * Wei Fu
    * Antonio Ojea
    * Derek McGowan
    * Henry Wang
    * Nabeel Rana
    * Phil Estes
    
    ### Changes
    <details><summary>8 commits</summary>
    <p>
    
    * Prepare release notes for 1.6.4 ([#6887](https://github.com/containerd/containerd/pull/6887))
      * [`0d1d2953b`](https://github.com/containerd/containerd/commit/0d1d2953bfec64910f7e11b5cc0049e4fdafbb0c) Prepare release notes for 1.6.4
    * [release/1.6 backport] Bump opencontainers/selinux from 1.10.0 to 1.10.1 ([#6878](https://github.com/containerd/containerd/pull/6878))
      * [`42d691fe6`](https://github.com/containerd/containerd/commit/42d691fe6bb18f523b643e8e960f9fa3abb13bc6) Bump opencontainers/selinux from 1.10.0 to 1.10.1
    * [release/1.6] Update go-cni to v1.1.5 backported due to conflict in go.mod ([#6877](https://github.com/containerd/containerd/pull/6877))
      * [`e9f22e008`](https://github.com/containerd/containerd/commit/e9f22e008b18a383cb440d86c8fd3a93e364f3f4) Update go-cni to v1.1.5
    * [release/1.6] cri: close fifos when container is deleted ([#6859](https://github.com/containerd/containerd/pull/6859))
      * [`be4909e95`](https://github.com/containerd/containerd/commit/be4909e950da484ceb7bf11ebd858a8757677d8f) cri: close fifos when container is deleted
    </p>
    </details>
    
    ### Changes from containerd/go-cni
    <details><summary>8 commits</summary>
    <p>
    
    * bump github.com/containernetworking/cni v1.1.0 ([#98](https://github.com/containerd/go-cni/pull/98))
      * [`e24193e`](https://github.com/containerd/go-cni/commit/e24193e4e5ade8070f9c0a73918f7e3fd782b0cc) bump github.com/containernetworking/cni v1.1.0
    * Revert "Update loopback version to support check" ([#96](https://github.com/containerd/go-cni/pull/96))
      * [`186662c`](https://github.com/containerd/go-cni/commit/186662cf27eee1f357c5f71b3a373d78c1e69988) Revert "Update loopback version to support check"
    * Use revive instead of golint ([#92](https://github.com/containerd/go-cni/pull/92))
      * [`322e8bf`](https://github.com/containerd/go-cni/commit/322e8bfbe6917a4343bc355f5a7f0525e0007099) Use revive instead of golint
    * Bump go verion to 1.17 ([#91](https://github.com/containerd/go-cni/pull/91))
      * [`9b78de4`](https://github.com/containerd/go-cni/commit/9b78de41083664e4ea005986ed39fa81cbb77cf5) Bump go verion to 1.17
    </p>
    </details>
    
    ### Dependency Changes
    
    * **github.com/containerd/go-cni**        v1.1.4 -> v1.1.5
    * **github.com/containernetworking/cni**  v1.0.1 -> v1.1.0
    * **github.com/opencontainers/selinux**   v1.10.0 -> v1.10.1
    
    Previous release can be found at [v1.6.3](https://github.com/containerd/containerd/releases/tag/v1.6.3)
    
  • v1.6.3

    containerd 1.6.3
    
    Welcome to the v1.6.3 release of containerd!
    
    The third patch release for containerd 1.6 includes various fixes and updates.
    
    ### Notable Updates
    
    * **Fix panic when configuring tracing plugin** ([#6853](https://github.com/containerd/containerd/pull/6853))
    * **Improve image pull performance in CRI plugin** ([#6816](https://github.com/containerd/containerd/pull/6816))
    * **Check for duplicate nspath** ([#6813](https://github.com/containerd/containerd/pull/6813))
    * **Fix deadlock in cgroup metrics collector** ([#6801](https://github.com/containerd/containerd/pull/6801))
    * **Mount devmapper xfs file system with "nouuid" option** ([#6731](https://github.com/containerd/containerd/pull/6731))
    * **Make the temp mount as ready only in container WithVolumes** ([#6730](https://github.com/containerd/containerd/pull/6730))
    * **Fix deadlock from leaving transaction open in native snapshotter** ([#6727](https://github.com/containerd/containerd/pull/6727))
    * **Monitor OOMKill events to prevent missing container events** ([#6734](https://github.com/containerd/containerd/pull/6734))
    
    See the changelog for complete list of changes
    
    Please try out the release binaries and report any issues at
    https://github.com/containerd/containerd/issues.
    
    ### Contributors
    
    * Stefan Berger
    * Wei Fu
    * Akihiro Suda
    * Derek McGowan
    * Phil Estes
    * Kazuyoshi Kato
    * Mike Brown
    * Sebastiaan van Stijn
    * Maksym Pavlenko
    * dependabot[bot]
    * Cory Snider
    * Henry Wang
    * Jeremi Piotrowski
    * Michael Zappa
    * Qiutong Song
    * Tõnis Tiigi
    * Ye Sijun
    
    ### Changes
    <details><summary>35 commits</summary>
    <p>
    
    * Prepare release notes for v1.6.3 ([#6844](https://github.com/containerd/containerd/pull/6844))
      * [`baa386dc0`](https://github.com/containerd/containerd/commit/baa386dc04afe1c8475be8c7c22a0d632482ff41) Prepare release notes for v1.6.3
    * [release/1.6] tracing: fix panic on startup when configured ([#6853](https://github.com/containerd/containerd/pull/6853))
      * [`e8da82adc`](https://github.com/containerd/containerd/commit/e8da82adcdc667d8247bd27a8b2c835d0872066b) tracing: fix panic on startup when configured
    * [release/1.6] CRI: improve image pulling performance ([#6816](https://github.com/containerd/containerd/pull/6816))
      * [`1764ea9a2`](https://github.com/containerd/containerd/commit/1764ea9a2815ddbd0cde777b557f97171b84cd02) CRI: improve image pulling performance
    * [release/1.6] update golang to 1.17.9 ([#6823](https://github.com/containerd/containerd/pull/6823))
      * [`9cd76d465`](https://github.com/containerd/containerd/commit/9cd76d465576ec766fc6385f14e27ca3cf536bc5) [release/1.6] update golang to 1.17.9
    * [release/1.6] check for duplicate nspath possibilities ([#6813](https://github.com/containerd/containerd/pull/6813))
      * [`c09cc1242`](https://github.com/containerd/containerd/commit/c09cc12421b3317ac83aa4412e7a174c8174e916) check for duplicate nspath possibilities
    * [release/1.6] metrics/cgroups: fix deadlock issue in Add during Collect ([#6801](https://github.com/containerd/containerd/pull/6801))
      * [`fe6ba62ce`](https://github.com/containerd/containerd/commit/fe6ba62ceae6c4b692d4a8feb5655f59351abd05) metrics/cgroups: fix deadlock issue in Add during Collect
    * [release/1.6] go.mod: update image-spec to merge-commit of v1 into main ([#6766](https://github.com/containerd/containerd/pull/6766))
      * [`8b81a7843`](https://github.com/containerd/containerd/commit/8b81a78434e9431771fd2bc0e2b226facc3f32f9) [release/1.6] go.mod: update image-spec to merge-commit of v1 into main
    * [release/1.6 backport] update runc to 1.1.1 ([#6759](https://github.com/containerd/containerd/pull/6759))
      * [`f2ba2041b`](https://github.com/containerd/containerd/commit/f2ba2041be70b2c61dfd3151e2d91c74a917c4bf) update runc binary to v1.1.1
      * [`b736b4dab`](https://github.com/containerd/containerd/commit/b736b4dab097bb79d11cc72c2ab3a19615613060) go.mod: github.com/opencontainers/runc v1.1.1
    * [release/1.6] CI: add Rocky Linux 8 ([#6752](https://github.com/containerd/containerd/pull/6752))
      * [`72f1e58c7`](https://github.com/containerd/containerd/commit/72f1e58c703db70b10486635c56c31b6758de29e) CI: add Rocky Linux 8
    * [release/1.6] vendor: github.com/containerd/imgcrypt v1.1.4 ([#6739](https://github.com/containerd/containerd/pull/6739))
      * [`7ede40c5c`](https://github.com/containerd/containerd/commit/7ede40c5ca3c8d0565798fa653402357b8c088a0) [release/1.6] vendor: github.com/containerd/imgcrypt v1.1.4
    * [release/1.6 backport] moving up to go-cni v1.1.4 ([#6728](https://github.com/containerd/containerd/pull/6728))
      * [`82a12edf2`](https://github.com/containerd/containerd/commit/82a12edf250b8df03c1dcfc6f18928fba6610250) moving up to go-cni v1.1.4
    * [release/1.6 backport] Update prometheus client vendor ([#6732](https://github.com/containerd/containerd/pull/6732))
      * [`da35c19da`](https://github.com/containerd/containerd/commit/da35c19dad1a39ad49341635e098a258af0d9566) Test turning off golang CI lint cache
      * [`a0213573b`](https://github.com/containerd/containerd/commit/a0213573b2179224fa9c0c876bf14e26416de2da) Add nolint:staticcheck to platform-specific calls
      * [`ad0036ed6`](https://github.com/containerd/containerd/commit/ad0036ed62be304b72bddcf01f1cfa5acf5c0a17) Update prometheus client vendor
    * [release/1.6 backport] Mount devmapper xfs file system with "nouuid" option. ([#6731](https://github.com/containerd/containerd/pull/6731))
      * [`c7bbf316f`](https://github.com/containerd/containerd/commit/c7bbf316f4f0f86355a87a82294d60119d7fe5e8) Mount devmapper xfs file system with "nouuid" option.
    * [release/1.6 backport] Make the temp mount as ready only in container WithVolumes ([#6730](https://github.com/containerd/containerd/pull/6730))
      * [`a1de89c3e`](https://github.com/containerd/containerd/commit/a1de89c3e8ed4e6918875bda626f6b2932b4e95c) Make the temp mount as ready only in container WithVolumes
    * [release/1.6 backport] native: fix deadlock from leaving transactions open ([#6727](https://github.com/containerd/containerd/pull/6727))
      * [`28b44826b`](https://github.com/containerd/containerd/commit/28b44826b004cb04a3d53820c1ba4f845d351963) native: fix deadlock from leaving transactions open
    * [release/1.6 backport] cgroup2: monitor OOMKill instead of OOM to prevent missing container events ([#6734](https://github.com/containerd/containerd/pull/6734))
      * [`5538be6cf`](https://github.com/containerd/containerd/commit/5538be6cf2f52ee09a1e9c217dcc031669ecc7c4) cgroup2: monitor OOMKill instead of OOM to prevent missing container OOM events
    </p>
    </details>
    
    ### Changes from containerd/go-cni
    <details><summary>8 commits</summary>
    <p>
    
    * moving up to latest CNI plugin release ([#90](https://github.com/containerd/go-cni/pull/90))
      * [`689fcd9`](https://github.com/containerd/go-cni/commit/689fcd968353e729ac9b5454087accf118472f57) moving up to latest CNI plugin release
    * Fix Loopback Version ([#88](https://github.com/containerd/go-cni/pull/88))
      * [`9ebcec1`](https://github.com/containerd/go-cni/commit/9ebcec1f5aae75ddd28394898d310212bc87c478) Update loopback version to support check
    * Update comment for capabilities ([#89](https://github.com/containerd/go-cni/pull/89))
      * [`a4d8d38`](https://github.com/containerd/go-cni/commit/a4d8d386ca3b4fd71850ab58769e5b5d4cc5ecdc) update comment for capabilities
    * Add integration test for linux and update go version from 1.16 to 1.17 ([#84](https://github.com/containerd/go-cni/pull/84))
      * [`49aa5ab`](https://github.com/containerd/go-cni/commit/49aa5ab910ad9812d2688764ff67dfdd42f77351) Add integration test and update go version
    </p>
    </details>
    
    ### Changes from containerd/imgcrypt
    <details><summary>13 commits</summary>
    <p>
    
    * CHANGES: Updated CHANGES document for 1.1.4 release ([#74](https://github.com/containerd/imgcrypt/pull/74))
      * [`f576654`](https://github.com/containerd/imgcrypt/commit/f5766549f0d7ff396aeef807f93701d5c5bd1954) CHANGES: Updated CHANGES document for 1.1.4 release
    * Bump github.com/containerd/containerd from 1.5.10 to 1.6.1 ([#73](https://github.com/containerd/imgcrypt/pull/73))
      * [`2efa871`](https://github.com/containerd/imgcrypt/commit/2efa871163e1bae96d137356abf6cb4cb70b8a21) Bump github.com/containerd/containerd from 1.5.10 to 1.6.1
    * images: prepare for typeurl.Any ([#72](https://github.com/containerd/imgcrypt/pull/72))
      * [`f842da4`](https://github.com/containerd/imgcrypt/commit/f842da460337d2d54f7f48af3b7234bbc3cfaa4e) images: prepare for typeurl.Any
      * [`6fdd981`](https://github.com/containerd/imgcrypt/commit/6fdd9818a4d8142107b7ecd767d839c9707700d9) images: Add list of Platforms to CheckAuthorization()
      * [`f440058`](https://github.com/containerd/imgcrypt/commit/f4400580b658c1fcb3cacc52dfb6104ea3c3aa82) test: Test running of encrypted image only pulled for local platform
    * Bump ocicrypt to 1.1.3 ([#71](https://github.com/containerd/imgcrypt/pull/71))
      * [`d4d4684`](https://github.com/containerd/imgcrypt/commit/d4d468487cecbd1ccf2f2eb1c05c8d3439471922) Bump ocicrypt to 1.1.3
      * [`727850f`](https://github.com/containerd/imgcrypt/commit/727850ffb1438cf9dd6a46c7ad4ec162984f7bb2) Bump github.com/containerd/containerd from 1.5.9 to 1.5.10
    * Bump github.com/containerd/containerd from 1.5.8 to 1.5.9 ([#67](https://github.com/containerd/imgcrypt/pull/67))
      * [`3c7db10`](https://github.com/containerd/imgcrypt/commit/3c7db10f6482b7771f14b7503ae69164f3fe793d) Bump github.com/containerd/containerd from 1.5.8 to 1.5.9
    </p>
    </details>
    
    ### Dependency Changes
    
    * **github.com/containerd/go-cni**            v1.1.3 -> v1.1.4
    * **github.com/containerd/imgcrypt**          v1.1.3 -> v1.1.4
    * **github.com/containernetworking/plugins**  v1.0.1 -> v1.1.1
    * **github.com/containers/ocicrypt**          v1.1.2 -> v1.1.3
    * **github.com/miekg/pkcs11**                 v1.0.3 -> v1.1.1
    * **github.com/opencontainers/image-spec**    693428a734f5 -> c5a74bcca799
    * **github.com/opencontainers/runc**          v1.1.0 -> v1.1.1
    * **github.com/prometheus/client_golang**     v1.11.0 -> v1.11.1
    
    Previous release can be found at [v1.6.2](https://github.com/containerd/containerd/releases/tag/v1.6.2)
    
    
  • debian/1.6.2_ds1-1

    containerd Debian release 1.6.2~ds1-1
  • upstream/1.6.2_ds1

    Upstream version 1.6.2~ds1
  • v1.6.2

    containerd 1.6.2
    
    Welcome to the v1.6.2 release of containerd!
    
    The second patch release for containerd 1.6 includes a fix for
    [CVE-2022-24769](https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c).
    
    ### Notable Updates
    
    * **Fix the inheritable capability defaults** ([GHSA-c9cp-9c75-9v8c](https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c))
    
    See the changelog for complete list of changes
    
    Please try out the release binaries and report any issues at
    https://github.com/containerd/containerd/issues.
    
    ### Contributors
    
    * Derek McGowan
    * Kazuyoshi Kato
    * Sebastiaan van Stijn
    * Akihiro Suda
    * Andrew G. Morgan
    * Phil Estes
    * Shengjing Zhu
    * Wei Fu
    
    ### Changes
    <details><summary>17 commits</summary>
    <p>
    
    * Prepare release notes for v1.6.2 ([#6725](https://github.com/containerd/containerd/pull/6725))
      * Prepare release notes for v1.6.2
      * Add static checks to shim for Windows
    * [release/1.6] update go.mod go version ([#6724](https://github.com/containerd/containerd/pull/6724))
      * Update go.mod go version
    * [release/1.6] remove empty go mod to allow building for go 1.18 ([#6717](https://github.com/containerd/containerd/pull/6717))
      * [release/1.6] remove empty go mod to allow building for go 1.18
    * Github Security Advisory [GHSA-c9cp-9c75-9v8c](https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c)
      * Fix the Inheritable capability defaults.
    * [release/1.6] cherry-pick: Update TestNormalize to only test Windows ([#6673](https://github.com/containerd/containerd/pull/6673))
      * Update TestNormalize to only test Windows
    * [release/1.6] cherry-pick: Upgrade golangci-lint and its GitHub Action ([#6675](https://github.com/containerd/containerd/pull/6675))
      * Upgrade golangci-lint and its GitHub Action
    * [release/1.6] cri: relax test for system without hugetlb ([#6623](https://github.com/containerd/containerd/pull/6623))
      * cri: relax test for system without hugetlb
    * [release/1.6] update to go 1.16.15, 1.17.8 to address CVE-2022-24921 ([#6620](https://github.com/containerd/containerd/pull/6620))
      * update to go 1.16.15, 1.17.8 to address CVE-2022-24921
    </p>
    </details>
    
    ### Dependency Changes
    
    This release has no dependency changes
    
    Previous release can be found at [v1.6.1](https://github.com/containerd/containerd/releases/tag/v1.6.1)
    
  • v1.5.11

    containerd 1.5.11
    
    Welcome to the v1.5.11 release of containerd!
    
    The eleventh patch release for containerd 1.5 includes a fix for
    [CVE-2022-24769](https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c).
    
    ### Notable Updates
    
    * **Fix the inheritable capability defaults** ([GHSA-c9cp-9c75-9v8c](https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c))
    
    See the changelog for complete list of changes
    
    Please try out the release binaries and report any issues at
    https://github.com/containerd/containerd/issues.
    
    ### Contributors
    
    * Derek McGowan
    * Sebastiaan van Stijn
    * Akihiro Suda
    * Andrew G. Morgan
    * Daniel Canter
    * Kazuyoshi Kato
    * Phil Estes
    
    ### Changes
    <details><summary>18 commits</summary>
    <p>
    
    * Prepare release notes for v1.5.11 ([#6723](https://github.com/containerd/containerd/pull/6723))
      * Prepare release notes for v1.5.11
    * [release/1.5] Upgrade Go to 1.17 and golangci-lint ([#6719](https://github.com/containerd/containerd/pull/6719))
      * Update go version to 1.17
      * Update linter errors
      * Run gofmt
      * Upgrade golangci-lint and its GitHub Action
    * [release/1.5] fix critools installation ([#6718](https://github.com/containerd/containerd/pull/6718))
      * Update get to install for cri tools
    * [release/1.5] remove empty go mod to allow building for go 1.18 ([#6716](https://github.com/containerd/containerd/pull/6716))
      * install-dev-tools: use go install, and pin by version
      * [release/1.5] remove empty go mod to allow building for go 1.18
    * Github Security Advisory [GHSA-c9cp-9c75-9v8c](https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c)
      * Fix the Inheritable capability defaults.
    * [release/1.5] update to go 1.16.15 to address CVE-2022-24921 ([#6621](https://github.com/containerd/containerd/pull/6621))
      * [release/1.5] update to go 1.16.15 to address CVE-2022-24921
    * [release/1.5] go.mod: Bump hcsshim to v0.8.24 ([#6588](https://github.com/containerd/containerd/pull/6588))
      * go.mod: Bump hcsshim to v0.8.24
    </p>
    </details>
    
    ### Dependency Changes
    
    * **github.com/Microsoft/hcsshim**  v0.8.23 -> v0.8.24
    
    Previous release can be found at [v1.5.10](https://github.com/containerd/containerd/releases/tag/v1.5.10)
    
  • debian/1.4.13_ds1-1_deb11u1

    containerd Debian release 1.4.13~ds1-1~deb11u1
  • debian/1.6.1_ds1-1

    containerd Debian release 1.6.1~ds1-1
  • upstream/1.6.1_ds1

    Upstream version 1.6.1~ds1
  • v1.6.1

    containerd 1.6.1
    
    Welcome to the v1.6.1 release of containerd!
    
    The first patch release for containerd 1.6 includes a fix for
    [CVE-2022-23648](https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7)
    and other issues.
    
    ### Notable Updates
    
    * **Use fs.RootPath when mounting volumes** ([GHSA-crp2-qrr5-8pq7](https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7))
    * **Return init pid when clean dead shim in runc.v1/v2 shims** ([#6572](https://github.com/containerd/containerd/pull/6572))
    
    See the changelog for complete list of changes
    
    Please try out the release binaries and report any issues at
    https://github.com/containerd/containerd/issues.
    
    ### Contributors
    
    * Derek McGowan
    * Jeff Zvier
    * Maksym Pavlenko
    * Wei Fu
    * ruiwen-zhao
    
    ### Changes
    <details><summary>7 commits</summary>
    <p>
    
    * [release/1.6] Prepare release notes for v1.6.1 ([#6607](https://github.com/containerd/containerd/pull/6607))
      * Prepare release notes for v1.6.1
    * Github Security Advisory [GHSA-crp2-qrr5-8pq7](https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7)
      * Use fs.RootPath when mounting volumes
    * [release/1.6] runc.v1/v2: return init pid when clean dead shim ([#6572](https://github.com/containerd/containerd/pull/6572))
      * containerd-shim-runc-v1: return init pid when clean dead shim
      * containerd-shim-runc-v2: return init pid when clean dead shim
    </p>
    </details>
    
    ### Dependency Changes
    
    This release has no dependency changes
    
    Previous release can be found at [v1.6.0](https://github.com/containerd/containerd/releases/tag/v1.6.0)
    
  • v1.5.10

    containerd 1.5.10
    
    Welcome to the v1.5.10 release of containerd!
    
    The tenth patch release for containerd 1.5 includes a fix for
    [CVE-2022-23648](https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7)
    and other issues.
    
    ### Notable Updates
    
    * **Use fs.RootPath when mounting volumes** ([GHSA-crp2-qrr5-8pq7](https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7))
    * **Return init pid when clean dead shim in runc.v1/v2 shims** ([#6570](https://github.com/containerd/containerd/pull/6570))
    * **Handle sigint/sigterm in shimv2** ([#6509](https://github.com/containerd/containerd/pull/6509))
    * **Use readonly mount to read user/group info** ([#6503](https://github.com/containerd/containerd/pull/6503))
    
    See the changelog for complete list of changes
    
    Please try out the release binaries and report any issues at
    https://github.com/containerd/containerd/issues.
    
    ### Contributors
    
    * Derek McGowan
    * Wei Fu
    * Sebastiaan van Stijn
    * Phil Estes
    * Alexander Minbaev
    * Brian Goff
    * Daniel Canter
    * David Porter
    * Kazuyoshi Kato
    * Maksym Pavlenko
    * ruiwen-zhao
    
    ### Changes
    <details><summary>22 commits</summary>
    <p>
    
    * [release/1.5] Prepare release notes for v1.5.10 ([#6606](https://github.com/containerd/containerd/pull/6606))
      * Prepare release notes for v1.5.10
    * Github Security Advisory [GHSA-crp2-qrr5-8pq7](https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7)
      * Use fs.RootPath when mounting volumes
    * [release/1.5] runc.v1/v2: return init pid when clean dead shim ([#6570](https://github.com/containerd/containerd/pull/6570))
      * runc.v1/v2: return init pid when clean dead shim
    * [release/1.5] Update Go to 1.16.14 ([#6556](https://github.com/containerd/containerd/pull/6556))
      * [release/1.5] Update Go to 1.16.14
    * Wait for containerd installation in GCE scripts [1.5 backport] ([#6552](https://github.com/containerd/containerd/pull/6552))
      * Wait for containerd installation in GCE scripts
    * [release/1.5] shimv2: handle sigint/sigterm ([#6509](https://github.com/containerd/containerd/pull/6509))
      * shimv2: handle sigint/sigterm
    * [release/1.5] Update Go to 1.16.13 ([#6526](https://github.com/containerd/containerd/pull/6526))
      * [release/1.5] Update Go to 1.16.13
    * [release/1.5 backport] GHA fixes, update GolangCI-Lint v1.42.0, and go-mdman v2.0.1  ([#6511](https://github.com/containerd/containerd/pull/6511))
      * script: update golangci-lint from v1.38.0 and v1.36.0 to v1.42.0
      * Fix Linux CI Linter using go 1.15.14
      * Update cpuguy83/go-md2man binary to v2.0.1
    * [release/1.5] oci: use readonly mount to read user/group info ([#6503](https://github.com/containerd/containerd/pull/6503))
      * oci: use readonly mount to read user/group info
    * [release/1.5] add-list-stat: return container list if filter is nil ([#6466](https://github.com/containerd/containerd/pull/6466))
      * add-list-stat: return container list if filter is nil
    </p>
    </details>
    
    ### Dependency Changes
    
    This release has no dependency changes
    
    Previous release can be found at [v1.5.9](https://github.com/containerd/containerd/releases/tag/v1.5.9)
    
  • upstream/1.4.13_ds1

    Upstream version 1.4.13~ds1
  • v1.4.13

    containerd 1.4.13
    
    Welcome to the v1.4.13 release of containerd!
    
    The thirteenth patch release for containerd 1.4 is a security release to address
    [CVE-2022-23648](https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7).
    
    ### Notable Updates
    
    * **Use fs.RootPath when mounting volumes** ([GHSA-crp2-qrr5-8pq7](https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7))
    
    See the changelog for complete list of changes
    
    Please try out the release binaries and report any issues at
    https://github.com/containerd/containerd/issues.
    
    ### Contributors
    
    * Derek McGowan
    * Sebastiaan van Stijn
    * Phil Estes
    * Akihiro Suda
    * David Porter
    * Kazuyoshi Kato
    * Michael Crosby
    
    ### Changes
    <details><summary>17 commits</summary>
    <p>
    
    * Github Security Advisory [GHSA-crp2-qrr5-8pq7](https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7)
      * Prepare release notes for v1.4.13
      * Use fs.RootPath when mounting volumes
    * [release/1.4] backport: Wait for containerd installation in GCE scripts ([#6553](https://github.com/containerd/containerd/pull/6553))
      * Wait for containerd installation in GCE scripts
    * [release/1.4] Update Go to 1.16.14 ([#6527](https://github.com/containerd/containerd/pull/6527))
      * Do not use `go get` to install executables
      * [release/1.4] update Go to 1.16.14
      * [release/1.4] Update Go to 1.16.13
    * [release/1.4] vendor: github.com/opencontainers/image-spec v1.0.2 ([#6265](https://github.com/containerd/containerd/pull/6265))
      * [release/1.4] vendor: github.com/opencontainers/image-spec v1.0.2
    * [release/1.4] Update Go to 1.16.12 ([#6368](https://github.com/containerd/containerd/pull/6368))
      * [release/1.4] Update Go to 1.16.12
    * [release/1.4] update runc binary to v1.0.3 ([#6344](https://github.com/containerd/containerd/pull/6344))
      * update runc binary to v1.0.3
    * [release/1.4] Update Go to 1.16.11 ([#6335](https://github.com/containerd/containerd/pull/6335))
      * [release/1.4] Update Go to 1.16.11
    </p>
    </details>
    
    ### Changes from containerd/cri
    <details><summary>4 commits</summary>
    <p>
    
    * [release/1.4] Use fs.RootPath when mounting volumes ([#1655](https://github.com/containerd/cri/pull/1655))
      * Use fs.RootPath when mounting volumes
    * [release/1.4] update Go 1.15.14 (to match containerd) ([#1645](https://github.com/containerd/cri/pull/1645))
      * [release/1.4] update Go 1.15.14 (to match containerd)
    </p>
    </details>
    
    ### Dependency Changes
    
    * **github.com/containerd/cri**             3b02bec16031 -> 8f1a8a1fb9eb
    * **github.com/opencontainers/image-spec**  v1.0.1 -> v1.0.2
    
    Previous release can be found at [v1.4.12](https://github.com/containerd/containerd/releases/tag/v1.4.12)
    
  • debian/1.6.0_ds1-5

    containerd Debian release 1.6.0~ds1-5
  • debian/1.6.0_ds1-4

    containerd Debian release 1.6.0~ds1-4