-
Notifications
You must be signed in to change notification settings - Fork 18.7k
Comparing changes
Open a pull request
base repository: moby/moby
base: v20.10.21
head repository: moby/moby
compare: v20.10.22
Commits on Nov 5, 2022
-
[20.10] update to Go 1.18.8 to address CVE-2022-41716
On Windows, syscall.StartProcess and os/exec.Cmd did not properly check for invalid environment variable values. A malicious environment variable value could exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" set the variables "A=B" and "C=D". Thanks to RyotaK (https://twitter.com/ryotkak) for reporting this issue. This is CVE-2022-41716 and Go issue https://go.dev/issue/56284. This Go release also fixes golang/go#56309, a runtime bug which can cause random memory corruption when a goroutine exits with runtime.LockOSThread() set. This fix is necessary to unblock work to replace certain uses of pkg/reexec with unshared OS threads. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Configuration menu - View commit details
-
Copy full SHA for 0211f9e - Browse repository at this point
Copy the full SHA 0211f9eView commit details -
distribution: Error when pulling OCI artifacts
Currently an attempt to pull a reference which resolves to an OCI artifact (Helm chart for example), results in a bit unrelated error message `invalid rootfs in image configuration`. This provides a more meaningful error in case a user attempts to download a media type which isn't image related. Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com> (cherry picked from commit 407e3a4) Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Configuration menu - View commit details
-
Copy full SHA for f292bf0 - Browse repository at this point
Copy the full SHA f292bf0View commit details
Commits on Nov 7, 2022
-
Merge pull request #44413 from thaJeztah/20.10_backport_oci_artifacts…
…_error [20.10 backport] distribution: Error when pulling OCI artifacts
Configuration menu - View commit details
-
Copy full SHA for 5ea9cf6 - Browse repository at this point
Copy the full SHA 5ea9cf6View commit details
Commits on Nov 9, 2022
-
Configuration menu - View commit details
-
Copy full SHA for 4ed81ac - Browse repository at this point
Copy the full SHA 4ed81acView commit details
Commits on Nov 16, 2022
-
update containerd binary to v1.6.10
Signed-off-by: Jintao Zhang <zhangjintao9020@gmail.com> (cherry picked from commit a5979a2) Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Configuration menu - View commit details
-
Copy full SHA for 7ebfee9 - Browse repository at this point
Copy the full SHA 7ebfee9View commit details
Commits on Nov 17, 2022
-
Merge pull request #44472 from thaJeztah/20.10_backport_containerd_v1…
….6.10 [20.10 backport] update containerd binary to v1.6.10
Configuration menu - View commit details
-
Copy full SHA for 6dfa15b - Browse repository at this point
Copy the full SHA 6dfa15bView commit details
Commits on Nov 23, 2022
-
[20.10] vendor: github.com/moby/libnetwork dcdf8f176d1e13ad719e913e79…
…6fb698d846de98 Co-authored-by: Sebastiaan van Stijn <github@gone.nl> Signed-off-by: Scott Buckfelder <buckscot@amazon.com>
Configuration menu - View commit details
-
Copy full SHA for 72b9ba4 - Browse repository at this point
Copy the full SHA 72b9ba4View commit details
Commits on Dec 1, 2022
-
seccomp: block socket calls to AF_VSOCK in default profile
This syncs the seccomp-profile with the latest changes in containerd's profile, applying the same changes as containerd/containerd@17a9324 Some background from the associated ticket: > We want to use vsock for guest-host communication on KubeVirt > (https://github.com/kubevirt/kubevirt). In KubeVirt we run VMs in pods. > > However since anyone can just connect from any pod to any VM with the > default seccomp settings, we cannot limit connection attempts to our > privileged node-agent. > > ### Describe the solution you'd like > We want to deny the `socket` syscall for the `AF_VSOCK` family by default. > > I see in [1] and [2] that AF_VSOCK was actually already blocked for some > time, but that got reverted since some architectures support the `socketcall` > syscall which can't be restricted properly. However we are mostly interested > in `arm64` and `amd64` where limiting `socket` would probably be enough. > > ### Additional context > I know that in theory we could use our own seccomp profiles, but we would want > to provide security for as many users as possible which use KubeVirt, and there > it would be very helpful if this protection could be added by being part of the > DefaultRuntime profile to easily ensure that it is active for all pods [3]. > > Impact on existing workloads: It is unlikely that this will disturb any existing > workload, becuase VSOCK is almost exclusively used for host-guest commmunication. > However if someone would still use it: Privileged pods would still be able to > use `socket` for `AF_VSOCK`, custom seccomp policies could be applied too. > Further it was already blocked for quite some time and the blockade got lifted > due to reasons not related to AF_VSOCK. > > The PR in KubeVirt which adds VSOCK support for additional context: [4] > > [1]: #29076 (comment) > [2]: dcf2632 > [3]: https://kubernetes.io/docs/tutorials/security/seccomp/#enable-the-use-of-runtimedefault-as-the-default-seccomp-profile-for-all-workloads > [4]: kubevirt/kubevirt#8546 Signed-off-by: Sebastiaan van Stijn <github@gone.nl> (cherry picked from commit 57b2290) Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Configuration menu - View commit details
-
Copy full SHA for a01576e - Browse repository at this point
Copy the full SHA a01576eView commit details
Commits on Dec 2, 2022
-
distribution: checkSupportedMediaType: allow additional media-types
This addresses a regression introduced in 407e3a4, which turned out to be "too strict", as there's old images that use, for example; docker pull python:3.5.1-alpine 3.5.1-alpine: Pulling from library/python unsupported media type application/octet-stream Before 407e3a4, such mediatypes were accepted; docker pull python:3.5.1-alpine 3.5.1-alpine: Pulling from library/python e110a4a17941: Pull complete 30dac23631f0: Pull complete 202fc3980a36: Pull complete Digest: sha256:f88925c97b9709dd6da0cb2f811726da9d724464e9be17a964c70f067d2aa64a Status: Downloaded newer image for python:3.5.1-alpine docker.io/library/python:3.5.1-alpine This patch copies the additional media-types, using the list of types that were added in a215e15, which fixed a similar issue. Signed-off-by: Sebastiaan van Stijn <github@gone.nl> (cherry picked from commit a6a5394) Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Configuration menu - View commit details
-
Copy full SHA for 966327c - Browse repository at this point
Copy the full SHA 966327cView commit details
Commits on Dec 5, 2022
-
Merge pull request #44564 from thaJeztah/20.10_backport_seccomp_block…
…_af_vsock [20.10 backport] seccomp: block socket calls to AF_VSOCK in default profile
Configuration menu - View commit details
-
Copy full SHA for cfb3ebe - Browse repository at this point
Copy the full SHA cfb3ebeView commit details
Commits on Dec 6, 2022
-
Includes security fixes for net/http (CVE-2022-41717, CVE-2022-41720), and os (CVE-2022-41720). These minor releases include 2 security fixes following the security policy: - os, net/http: avoid escapes from os.DirFS and http.Dir on Windows The os.DirFS function and http.Dir type provide access to a tree of files rooted at a given directory. These functions permitted access to Windows device files under that root. For example, os.DirFS("C:/tmp").Open("COM1") would open the COM1 device. Both os.DirFS and http.Dir only provide read-only filesystem access. In addition, on Windows, an os.DirFS for the directory \(the root of the current drive) can permit a maliciously crafted path to escape from the drive and access any path on the system. The behavior of os.DirFS("") has changed. Previously, an empty root was treated equivalently to "/", so os.DirFS("").Open("tmp") would open the path "/tmp". This now returns an error. This is CVE-2022-41720 and Go issue https://go.dev/issue/56694. - net/http: limit canonical header cache by bytes, not entries An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection. This issue is also fixed in golang.org/x/net/http2 vX.Y.Z, for users manually configuring HTTP/2. Thanks to Josselin Costanzi for reporting this issue. This is CVE-2022-41717 and Go issue https://go.dev/issue/56350. View the release notes for more information: https://go.dev/doc/devel/release#go1.18.9 And the milestone on the issue tracker: https://github.com/golang/go/issues?q=milestone%3AGo1.18.9+label%3ACherryPickApproved Full diff: golang/go@go1.18.8...go1.18.9 The golang.org/x/net fix is in golang/net@1e63c2f Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Configuration menu - View commit details
-
Copy full SHA for f8b0d77 - Browse repository at this point
Copy the full SHA f8b0d77View commit details -
[20.10] update containerd binary to v1.6.11
Welcome to the v1.6.11 release of containerd! The eleventh patch release for containerd 1.6 contains a various fixes and updates. Notable Updates - Add pod UID annotation in CRI plugin - Fix nil pointer deference for Windows containers in CRI plugin - Fix lease labels unexpectedly overwriting expiration - Fix for simultaneous diff creation using the same parent snapshot Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Configuration menu - View commit details
-
Copy full SHA for 565fcdd - Browse repository at this point
Copy the full SHA 565fcddView commit details
Commits on Dec 7, 2022
-
Merge pull request #44593 from thaJeztah/20.10_update_go_1.18.9
[20.10] update to go1.18.9
Configuration menu - View commit details
-
Copy full SHA for 17451d2 - Browse repository at this point
Copy the full SHA 17451d2View commit details -
Merge pull request #44569 from thaJeztah/20.10_backport_relax_checkSu…
…pportedMediaType [20.10 backport] distribution: checkSupportedMediaType: allow additional media-types
Configuration menu - View commit details
-
Copy full SHA for 50d4d98 - Browse repository at this point
Copy the full SHA 50d4d98View commit details -
Merge pull request #44597 from thaJeztah/20.10_containerd_1.6.11
[20.10] update containerd binary to v1.6.11
Configuration menu - View commit details
-
Copy full SHA for 48f955d - Browse repository at this point
Copy the full SHA 48f955dView commit details -
[20.10] update containerd binary to v1.6.12 (addresses CVE-2022-23471)
The twelfth patch release for containerd 1.6 contains a fix for CVE-2022-23471. Notable Updates - Fix goroutine leak during Exec in CRI plugin (GHSA-2qjp-425j-52j9) full diff: containerd/containerd@v1.6.11...v1.6.12 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Configuration menu - View commit details
-
Copy full SHA for a9fdcd5 - Browse repository at this point
Copy the full SHA a9fdcd5View commit details
Commits on Dec 8, 2022
-
Merge pull request #44607 from thaJeztah/20.10_containerd_binary_1.6.12
[20.10] update containerd binary to v1.6.12 (addresses CVE-2022-23471)
Configuration menu - View commit details
-
Copy full SHA for 194e73f - Browse repository at this point
Copy the full SHA 194e73fView commit details -
Merge pull request #44476 from sbuckfelder/20.10_UPDATE
[20.10] vendor: github.com/moby/libnetwork dcdf8f176d1e13ad719e913e796fb698d846de98
Configuration menu - View commit details
-
Copy full SHA for 6112b23 - Browse repository at this point
Copy the full SHA 6112b23View commit details -
[20.10] update gotestsum to v1.8.2
release notes: https://github.com/gotestyourself/gotestsum/releases/tag/v1.8.2 - Show shuffle seed - Update tests, and cleanup formats - Update dependencies - Test against go1.19, remove go1.15 - Add project name to junit.xml output - Adding in support for s390x and ppc64le full diff: gotestyourself/gotestsum@v1.7.0...v1.8.2 (adapted from commit 882ddf4) Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Configuration menu - View commit details
-
Copy full SHA for edca413 - Browse repository at this point
Copy the full SHA edca413View commit details
Commits on Dec 15, 2022
-
Merge pull request #44488 from thaJeztah/20.10_backport_update_gotestsum
[20.10] update gotestsum to v1.8.2
Configuration menu - View commit details
-
Copy full SHA for 0234322 - Browse repository at this point
Copy the full SHA 0234322View commit details -
update containerd binary to v1.6.13
Notable Updates - Update overlay snapshotter to check for tmpfs when evaluating usage of userxattr - Update hcsschim to v0.9.6 to fix resource leak on exec - Make swapping disabled with memory limit in CRI plugin - Allow clients to remove created tasks with PID 0 - Fix concurrent map iteration and map write in CRI port forwarding - Check for nil HugepageLimits to avoid panic in CRI plugin See the changelog for complete list of changes: https://github.com/containerd/containerd/releases/tag/v1.6.13 full diff: containerd/containerd@v1.6.12...v1.6.13 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Configuration menu - View commit details
-
Copy full SHA for ff29c40 - Browse repository at this point
Copy the full SHA ff29c40View commit details -
Merge pull request #44656 from thaJeztah/20.10_containerd_binary_1.6.13
[20.10] update containerd binary to v1.6.13
Configuration menu - View commit details
-
Copy full SHA for 42c8b31 - Browse repository at this point
Copy the full SHA 42c8b31View commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff v20.10.21...v20.10.22