Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: moby/moby
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v20.10.21
Choose a base ref
...
head repository: moby/moby
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: v20.10.22
Choose a head ref

Commits on Nov 5, 2022

  1. [20.10] update to Go 1.18.8 to address CVE-2022-41716

        On Windows, syscall.StartProcess and os/exec.Cmd did not properly
        check for invalid environment variable values. A malicious
        environment variable value could exploit this behavior to set a
        value for a different environment variable. For example, the
        environment variable string "A=B\x00C=D" set the variables "A=B" and
        "C=D".
    
        Thanks to RyotaK (https://twitter.com/ryotkak) for reporting this
        issue.
    
        This is CVE-2022-41716 and Go issue https://go.dev/issue/56284.
    
    This Go release also fixes golang/go#56309, a
    runtime bug which can cause random memory corruption when a goroutine
    exits with runtime.LockOSThread() set. This fix is necessary to unblock
    work to replace certain uses of pkg/reexec with unshared OS threads.
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Nov 5, 2022
    Copy the full SHA
    0211f9e View commit details
  2. distribution: Error when pulling OCI artifacts

    Currently an attempt to pull a reference which resolves to an OCI
    artifact (Helm chart for example), results in a bit unrelated error
    message `invalid rootfs in image configuration`.
    
    This provides a more meaningful error in case a user attempts to
    download a media type which isn't image related.
    
    Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
    (cherry picked from commit 407e3a4)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    vvoland authored and thaJeztah committed Nov 5, 2022
    Copy the full SHA
    f292bf0 View commit details

Commits on Nov 7, 2022

  1. Merge pull request #44413 from thaJeztah/20.10_backport_oci_artifacts…

    …_error
    
    [20.10 backport] distribution: Error when pulling OCI artifacts
    thaJeztah authored Nov 7, 2022
    Copy the full SHA
    5ea9cf6 View commit details

Commits on Nov 9, 2022

  1. Copy the full SHA
    4ed81ac View commit details

Commits on Nov 16, 2022

  1. update containerd binary to v1.6.10

    Signed-off-by: Jintao Zhang <zhangjintao9020@gmail.com>
    (cherry picked from commit a5979a2)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    tao12345666333 authored and thaJeztah committed Nov 16, 2022
    Copy the full SHA
    7ebfee9 View commit details

Commits on Nov 17, 2022

  1. Merge pull request #44472 from thaJeztah/20.10_backport_containerd_v1…

    ….6.10
    
    [20.10 backport] update containerd binary to v1.6.10
    thaJeztah authored Nov 17, 2022
    Copy the full SHA
    6dfa15b View commit details

Commits on Nov 23, 2022

  1. [20.10] vendor: github.com/moby/libnetwork dcdf8f176d1e13ad719e913e79…

    …6fb698d846de98
    
    Co-authored-by: Sebastiaan van Stijn <github@gone.nl>
    Signed-off-by: Scott Buckfelder <buckscot@amazon.com>
    Scott Buckfelder and thaJeztah committed Nov 23, 2022
    Copy the full SHA
    72b9ba4 View commit details

Commits on Dec 1, 2022

  1. seccomp: block socket calls to AF_VSOCK in default profile

    This syncs the seccomp-profile with the latest changes in containerd's
    profile, applying the same changes as containerd/containerd@17a9324
    
    Some background from the associated ticket:
    
    > We want to use vsock for guest-host communication on KubeVirt
    > (https://github.com/kubevirt/kubevirt). In KubeVirt we run VMs in pods.
    >
    > However since anyone can just connect from any pod to any VM with the
    > default seccomp settings, we cannot limit connection attempts to our
    > privileged node-agent.
    >
    > ### Describe the solution you'd like
    > We want to deny the `socket` syscall for the `AF_VSOCK` family by default.
    >
    > I see in [1] and [2] that AF_VSOCK was actually already blocked for some
    > time, but that got reverted since some architectures support the `socketcall`
    > syscall which can't be restricted properly. However we are mostly interested
    > in `arm64` and `amd64` where limiting `socket` would probably be enough.
    >
    > ### Additional context
    > I know that in theory we could use our own seccomp profiles, but we would want
    > to provide security for as many users as possible which use KubeVirt, and there
    > it would be very helpful if this protection could be added by being part of the
    > DefaultRuntime profile to easily ensure that it is active for all pods [3].
    >
    > Impact on existing workloads: It is unlikely that this will disturb any existing
    > workload, becuase VSOCK is almost exclusively used for host-guest commmunication.
    > However if someone would still use it: Privileged pods would still be able to
    > use `socket` for `AF_VSOCK`, custom seccomp policies could be applied too.
    > Further it was already blocked for quite some time and the blockade got lifted
    > due to reasons not related to AF_VSOCK.
    >
    > The PR in KubeVirt which adds VSOCK support for additional context: [4]
    >
    > [1]: #29076 (comment)
    > [2]: dcf2632
    > [3]: https://kubernetes.io/docs/tutorials/security/seccomp/#enable-the-use-of-runtimedefault-as-the-default-seccomp-profile-for-all-workloads
    > [4]: kubevirt/kubevirt#8546
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    (cherry picked from commit 57b2290)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Dec 1, 2022
    Copy the full SHA
    a01576e View commit details

Commits on Dec 2, 2022

  1. distribution: checkSupportedMediaType: allow additional media-types

    This addresses a regression introduced in 407e3a4,
    which turned out to be "too strict", as there's old images that use, for example;
    
        docker pull python:3.5.1-alpine
        3.5.1-alpine: Pulling from library/python
        unsupported media type application/octet-stream
    
    Before 407e3a4, such mediatypes were accepted;
    
        docker pull python:3.5.1-alpine
        3.5.1-alpine: Pulling from library/python
        e110a4a17941: Pull complete
        30dac23631f0: Pull complete
        202fc3980a36: Pull complete
        Digest: sha256:f88925c97b9709dd6da0cb2f811726da9d724464e9be17a964c70f067d2aa64a
        Status: Downloaded newer image for python:3.5.1-alpine
        docker.io/library/python:3.5.1-alpine
    
    This patch copies the additional media-types, using the list of types that
    were added in a215e15, which fixed a
    similar issue.
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    (cherry picked from commit a6a5394)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Dec 2, 2022
    Copy the full SHA
    966327c View commit details

Commits on Dec 5, 2022

  1. Merge pull request #44564 from thaJeztah/20.10_backport_seccomp_block…

    …_af_vsock
    
    [20.10 backport] seccomp: block socket calls to AF_VSOCK in default profile
    thaJeztah authored Dec 5, 2022
    Copy the full SHA
    cfb3ebe View commit details

Commits on Dec 6, 2022

  1. [20.10] update to go1.18.9

    Includes security fixes for net/http (CVE-2022-41717, CVE-2022-41720),
    and os (CVE-2022-41720).
    
    These minor releases include 2 security fixes following the security policy:
    
    - os, net/http: avoid escapes from os.DirFS and http.Dir on Windows
    
      The os.DirFS function and http.Dir type provide access to a tree of files
      rooted at a given directory. These functions permitted access to Windows
      device files under that root. For example, os.DirFS("C:/tmp").Open("COM1")
      would open the COM1 device.
      Both os.DirFS and http.Dir only provide read-only filesystem access.
    
      In addition, on Windows, an os.DirFS for the directory \(the root of the
      current drive) can permit a maliciously crafted path to escape from the
      drive and access any path on the system.
    
      The behavior of os.DirFS("") has changed. Previously, an empty root was
      treated equivalently to "/", so os.DirFS("").Open("tmp") would open the
      path "/tmp". This now returns an error.
    
      This is CVE-2022-41720 and Go issue https://go.dev/issue/56694.
    
    - net/http: limit canonical header cache by bytes, not entries
    
      An attacker can cause excessive memory growth in a Go server accepting
      HTTP/2 requests.
    
      HTTP/2 server connections contain a cache of HTTP header keys sent by
      the client. While the total number of entries in this cache is capped,
      an attacker sending very large keys can cause the server to allocate
      approximately 64 MiB per open connection.
    
      This issue is also fixed in golang.org/x/net/http2 vX.Y.Z, for users
      manually configuring HTTP/2.
    
      Thanks to Josselin Costanzi for reporting this issue.
    
      This is CVE-2022-41717 and Go issue https://go.dev/issue/56350.
    
    View the release notes for more information:
    https://go.dev/doc/devel/release#go1.18.9
    
    And the milestone on the issue tracker:
    https://github.com/golang/go/issues?q=milestone%3AGo1.18.9+label%3ACherryPickApproved
    
    Full diff: golang/go@go1.18.8...go1.18.9
    
    The golang.org/x/net fix is in golang/net@1e63c2f
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Dec 6, 2022
    Copy the full SHA
    f8b0d77 View commit details
  2. [20.10] update containerd binary to v1.6.11

    Welcome to the v1.6.11 release of containerd!
    
    The eleventh patch release for containerd 1.6 contains a various fixes and updates.
    
    Notable Updates
    
    - Add pod UID annotation in CRI plugin
    - Fix nil pointer deference for Windows containers in CRI plugin
    - Fix lease labels unexpectedly overwriting expiration
    - Fix for simultaneous diff creation using the same parent snapshot
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Dec 6, 2022
    Copy the full SHA
    565fcdd View commit details

Commits on Dec 7, 2022

  1. Merge pull request #44593 from thaJeztah/20.10_update_go_1.18.9

    [20.10] update to go1.18.9
    thaJeztah authored Dec 7, 2022
    Copy the full SHA
    17451d2 View commit details
  2. Merge pull request #44569 from thaJeztah/20.10_backport_relax_checkSu…

    …pportedMediaType
    
    [20.10 backport] distribution: checkSupportedMediaType: allow additional media-types
    thaJeztah authored Dec 7, 2022
    Copy the full SHA
    50d4d98 View commit details
  3. Merge pull request #44597 from thaJeztah/20.10_containerd_1.6.11

    [20.10] update containerd binary to v1.6.11
    thaJeztah authored Dec 7, 2022
    Copy the full SHA
    48f955d View commit details
  4. [20.10] update containerd binary to v1.6.12 (addresses CVE-2022-23471)

    The twelfth patch release for containerd 1.6 contains a fix for CVE-2022-23471.
    
    Notable Updates
    
    - Fix goroutine leak during Exec in CRI plugin (GHSA-2qjp-425j-52j9)
    
    full diff: containerd/containerd@v1.6.11...v1.6.12
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Dec 7, 2022
    Copy the full SHA
    a9fdcd5 View commit details

Commits on Dec 8, 2022

  1. Merge pull request #44607 from thaJeztah/20.10_containerd_binary_1.6.12

    [20.10] update containerd binary to v1.6.12 (addresses CVE-2022-23471)
    thaJeztah authored Dec 8, 2022
    Copy the full SHA
    194e73f View commit details
  2. Merge pull request #44476 from sbuckfelder/20.10_UPDATE

    [20.10] vendor: github.com/moby/libnetwork dcdf8f176d1e13ad719e913e796fb698d846de98
    thaJeztah authored Dec 8, 2022
    Copy the full SHA
    6112b23 View commit details
  3. [20.10] update gotestsum to v1.8.2

    release notes: https://github.com/gotestyourself/gotestsum/releases/tag/v1.8.2
    
    - Show shuffle seed
    - Update tests, and cleanup formats
    - Update dependencies
    - Test against go1.19, remove go1.15
    - Add project name to junit.xml output
    - Adding in support for s390x and ppc64le
    
    full diff: gotestyourself/gotestsum@v1.7.0...v1.8.2
    
    (adapted from commit 882ddf4)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Dec 8, 2022
    Copy the full SHA
    edca413 View commit details

Commits on Dec 15, 2022

  1. Merge pull request #44488 from thaJeztah/20.10_backport_update_gotestsum

    [20.10] update gotestsum to v1.8.2
    thaJeztah authored Dec 15, 2022
    Copy the full SHA
    0234322 View commit details
  2. update containerd binary to v1.6.13

    Notable Updates
    
    - Update overlay snapshotter to check for tmpfs when evaluating usage of userxattr
    - Update hcsschim to v0.9.6 to fix resource leak on exec
    - Make swapping disabled with memory limit in CRI plugin
    - Allow clients to remove created tasks with PID 0
    - Fix concurrent map iteration and map write in CRI port forwarding
    - Check for nil HugepageLimits to avoid panic in CRI plugin
    
    See the changelog for complete list of changes:
    https://github.com/containerd/containerd/releases/tag/v1.6.13
    
    full diff: containerd/containerd@v1.6.12...v1.6.13
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Dec 15, 2022
    Copy the full SHA
    ff29c40 View commit details
  3. Merge pull request #44656 from thaJeztah/20.10_containerd_binary_1.6.13

    [20.10] update containerd binary to v1.6.13
    thaJeztah authored Dec 15, 2022
    Copy the full SHA
    42c8b31 View commit details
Loading