-
Notifications
You must be signed in to change notification settings - Fork 18.7k
Comparing changes
Open a pull request
base repository: moby/moby
base: v23.0.3
head repository: moby/moby
compare: v23.0.4
Commits on Mar 28, 2023
-
integration-cli: Enable TestExecStartFails on Windows
Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com> (cherry picked from commit be34e93) Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
Configuration menu - View commit details
-
Copy full SHA for f3946c1 - Browse repository at this point
Copy the full SHA f3946c1View commit details
Commits on Mar 30, 2023
-
release notes: https://github.com/opencontainers/runc/releases/tag/v1.1.5 diff: opencontainers/runc@v1.1.4...v1.1.5 This is the fifth patch release in the 1.1.z series of runc, which fixes three CVEs found in runc. * CVE-2023-25809 is a vulnerability involving rootless containers where (under specific configurations), the container would have write access to the /sys/fs/cgroup/user.slice/... cgroup hierarchy. No other hierarchies on the host were affected. This vulnerability was discovered by Akihiro Suda. <GHSA-m8cg-xc2p-r3fc> * CVE-2023-27561 was a regression which effectively re-introduced CVE-2019-19921. This bug was present from v1.0.0-rc95 to v1.1.4. This regression was discovered by @Beuc. <GHSA-vpvm-3wq2-2wvm> * CVE-2023-28642 is a variant of CVE-2023-27561 and was fixed by the same patch. This variant of the above vulnerability was reported by Lei Wang. <GHSA-g2j6-57v7-gm8c> In addition, the following other fixes are included in this release: * Fix the inability to use `/dev/null` when inside a container. * Fix changing the ownership of host's `/dev/null` caused by fd redirection (a regression in 1.1.1). * Fix rare runc exec/enter unshare error on older kernels, including CentOS < 7.7. * nsexec: Check for errors in `write_log()`. Signed-off-by: Sebastiaan van Stijn <github@gone.nl> (cherry picked from commit 77be7b7) Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Configuration menu - View commit details
-
Copy full SHA for 3923e30 - Browse repository at this point
Copy the full SHA 3923e30View commit details -
libnet/d/windows: log EnableInternalDNS val after setting it
Signed-off-by: Albin Kerouanton <albinker@gmail.com> (cherry picked from commit bae49ff) Signed-off-by: Albin Kerouanton <albinker@gmail.com>
Configuration menu - View commit details
-
Copy full SHA for 348544e - Browse repository at this point
Copy the full SHA 348544eView commit details -
update containerd binary to v1.6.20
Notable Updates - Disable looking up usernames and groupnames on host - Add support for Windows ArgsEscaped images - Update hcsshim to v0.9.8 - Fix debug flag in shim - Add WithReadonlyTempMount to support readonly temporary mounts - Update ttrpc to fix file descriptor leak - Update runc binary to v1.1.5 = Update image config to support ArgsEscaped full diff: containerd/containerd@v1.6.19...v1.6.20 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Configuration menu - View commit details
-
Copy full SHA for 389e180 - Browse repository at this point
Copy the full SHA 389e180View commit details
Commits on Mar 31, 2023
-
daemon: let libnetwork assign default bridge IPAM
The netutils.ElectInterfaceAddresses function is only used in one place outside of tests: in the daemon, to configure the default bridge network. The function is also messy to reason about as it references the shared mutable state of ipamutils.PredefinedLocalScopeDefaultNetworks. It uses the list of predefined default networks to always return an IPv4 address even if the named interface does not exist or does not have any IPv4 addresses. This list happens to be the same as the one used to initialize the address pool of the 'builtin' IPAM driver, though that is far from obvious. (Start with "./libnetwork".initIPAMDrivers and trace the dataflow of the addressPool value. Surprise! Global state is being mutated using the value of other global mutable state.) The daemon does not need the fallback behaviour of ElectInterfaceAddresses. In fact, the daemon does not have to configure an address pool for the network at all! libnetwork will acquire one of the available address ranges from the network's IPAM driver when the preferred-pool configuration is unset. It will do so using the same list of address ranges and the exact same logic (netutils.FindAvailableNetworks) as ElectInterfaceAddresses. So unless the daemon needs to force the network to use a specific address range because the bridge interface already exists, it can leave the details up to libnetwork. Signed-off-by: Cory Snider <csnider@mirantis.com> (cherry picked from commit cc19eba) Signed-off-by: Albin Kerouanton <albinker@gmail.com>
Configuration menu - View commit details
-
Copy full SHA for 063d3a6 - Browse repository at this point
Copy the full SHA 063d3a6View commit details
Commits on Apr 5, 2023
-
Merge pull request #45246 from akerouanton/cherrypick-44827
[23.0 backport] daemon: let libnetwork assign default bridge IPAM
Configuration menu - View commit details
-
Copy full SHA for 15d6037 - Browse repository at this point
Copy the full SHA 15d6037View commit details -
Merge pull request #45245 from thaJeztah/23.0_containerd_binary_1.6.20
[23.0] update containerd binary to v1.6.20
Configuration menu - View commit details
-
Copy full SHA for aaa102b - Browse repository at this point
Copy the full SHA aaa102bView commit details -
Merge pull request #45240 from akerouanton/cherrypick-45211
[23.0 backport] libnet/d/windows: log EnableInternalDNS val after setting it
Configuration menu - View commit details
-
Copy full SHA for 3648a49 - Browse repository at this point
Copy the full SHA 3648a49View commit details -
Merge pull request #45237 from thaJeztah/23.0_backport_update_runc_bi…
…nary_1.1.5 [23.0 backport] update runc binary to v1.1.5
Configuration menu - View commit details
-
Copy full SHA for 0ce1e22 - Browse repository at this point
Copy the full SHA 0ce1e22View commit details -
Merge pull request #45220 from vvoland/test-windows-execstartfails-23
[23.0 backport] integration-cli: Enable TestExecStartFails on Windows
Configuration menu - View commit details
-
Copy full SHA for c9f6343 - Browse repository at this point
Copy the full SHA c9f6343View commit details -
[23.0] fix vendor.mod: add hashicorp/go-multierror as direct dependency
commit 59118bf made this a direct dependency (previously it was indirect). That commit was part of an advisory, and didn't run the vendor validation check because of that. This patch fixes the vendor.mod to unblock CI in this branch. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Configuration menu - View commit details
-
Copy full SHA for a0a597c - Browse repository at this point
Copy the full SHA a0a597cView commit details -
Merge pull request #45279 from thaJeztah/23.0_fix_vendor
[23.0] fix vendor.mod: add hashicorp/go-multierror as direct dependency
Configuration menu - View commit details
-
Copy full SHA for 347bce4 - Browse repository at this point
Copy the full SHA 347bce4View commit details -
go1.19.8 (released 2023-04-04) includes security fixes to the go/parser, html/template, mime/multipart, net/http, and net/textproto packages, as well as bug fixes to the linker, the runtime, and the time package. See the Go 1.19.8 milestone on our issue tracker for details: https://github.com/golang/go/issues?q=milestone%3AGo1.19.8+label%3ACherryPickApproved full diff: golang/go@go1.19.7...go1.19.8 Further details from the announcement on the mailing list: We have just released Go versions 1.20.3 and 1.19.8, minor point releases. These minor releases include 4 security fixes following the security policy: - go/parser: infinite loop in parsing Calling any of the Parse functions on Go source code which contains `//line` directives with very large line numbers can cause an infinite loop due to integer overflow. Thanks to Philippe Antoine (Catena cyber) for reporting this issue. This is CVE-2023-24537 and Go issue https://go.dev/issue/59180. - html/template: backticks not treated as string delimiters Templates did not properly consider backticks (`) as Javascript string delimiters, and as such did not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contained a Go template action within a Javascript template literal, the contents of the action could be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, we've decided to simply disallow Go template actions from being used inside of them (e.g. "var a = {{.}}"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. Template.Parse will now return an Error when it encounters templates like this, with a currently unexported ErrorCode with a value of 12. This ErrorCode will be exported in the next major release. Users who rely on this behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution. Thanks to Sohom Datta, Manipal Institute of Technology, for reporting this issue. This is CVE-2023-24538 and Go issue https://go.dev/issue/59234. - net/http, net/textproto: denial of service from excessive memory allocation HTTP and MIME header parsing could allocate large amounts of memory, even when parsing small inputs. Certain unusual patterns of input data could cause the common function used to parse HTTP and MIME headers to allocate substantially more memory than required to hold the parsed headers. An attacker can exploit this behavior to cause an HTTP server to allocate large amounts of memory from a small request, potentially leading to memory exhaustion and a denial of service. Header parsing now correctly allocates only the memory required to hold parsed headers. Thanks to Jakob Ackermann (@das7pad) for discovering this issue. This is CVE-2023-24534 and Go issue https://go.dev/issue/58975. - net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption Multipart form parsing can consume large amounts of CPU and memory when processing form inputs containing very large numbers of parts. This stems from several causes: mime/multipart.Reader.ReadForm limits the total memory a parsed multipart form can consume. ReadForm could undercount the amount of memory consumed, leading it to accept larger inputs than intended. Limiting total memory does not account for increased pressure on the garbage collector from large numbers of small allocations in forms with many parts. ReadForm could allocate a large number of short-lived buffers, further increasing pressure on the garbage collector. The combination of these factors can permit an attacker to cause an program that parses multipart forms to consume large amounts of CPU and memory, potentially resulting in a denial of service. This affects programs that use mime/multipart.Reader.ReadForm, as well as form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue. ReadForm now does a better job of estimating the memory consumption of parsed forms, and performs many fewer short-lived allocations. In addition, mime/multipart.Reader now imposes the following limits on the size of parsed forms: Forms parsed with ReadForm may contain no more than 1000 parts. This limit may be adjusted with the environment variable GODEBUG=multipartmaxparts=. Form parts parsed with NextPart and NextRawPart may contain no more than 10,000 header fields. In addition, forms parsed with ReadForm may contain no more than 10,000 header fields across all parts. This limit may be adjusted with the environment variable GODEBUG=multipartmaxheaders=. Thanks to Jakob Ackermann for discovering this issue. This is CVE-2023-24536 and Go issue https://go.dev/issue/59153. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Configuration menu - View commit details
-
Copy full SHA for d3e5293 - Browse repository at this point
Copy the full SHA d3e5293View commit details -
Merge pull request #45277 from thaJeztah/23.0_bump_go1.19.8
[23.0] update go to go1.19.8
Configuration menu - View commit details
-
Copy full SHA for 4ca4705 - Browse repository at this point
Copy the full SHA 4ca4705View commit details
Commits on Apr 7, 2023
-
docker-rootless-setuptools.sh: improve readability of messages
Before: ```console $ docker-rootless-setuptool.sh install ... [INFO] Use CLI context "rootless" Current context is now "rootless" [INFO] Make sure the following environment variables are set (or add them to ~/.bashrc): export PATH=/usr/local/bin:$PATH Some applications may require the following environment variable too: export DOCKER_HOST=unix:///run/user/1001/docker.sock ``` After: ```console $ docker-rootless-setuptool.sh install ... [INFO] Using CLI context "rootless" Current context is now "rootless" [INFO] Make sure the following environment variable(s) are set (or add them to ~/.bashrc): export PATH=/usr/local/bin:$PATH [INFO] Some applications may require the following environment variable too: export DOCKER_HOST=unix:///run/user/1001/docker.sock ``` Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp> (cherry picked from commit 4aa2876) Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
Configuration menu - View commit details
-
Copy full SHA for 09fbbd5 - Browse repository at this point
Copy the full SHA 09fbbd5View commit details
Commits on Apr 12, 2023
-
Merge pull request #45293 from AkihiroSuda/backport-45283-23
[23.0 backport] docker-rootless-setuptools.sh: improve readability of messages
Configuration menu - View commit details
-
Copy full SHA for cdb6200 - Browse repository at this point
Copy the full SHA cdb6200View commit details
Commits on Apr 13, 2023
-
vendor: github.com/ishidawataru/sctp v0.0.0-20230406120618-7ff4192f6ff2
- Prevent from descriptor leak - Fixes optlen in getsockopt() for s390x full diff: ishidawataru/sctp@9a39160...7ff4192 Signed-off-by: Sebastiaan van Stijn <github@gone.nl> (cherry picked from commit 893d284) Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Configuration menu - View commit details
-
Copy full SHA for 9277e64 - Browse repository at this point
Copy the full SHA 9277e64View commit details -
Merge pull request #45323 from thaJeztah/23.0_backport_vendor_sctp
[23.0 backport] vendor: github.com/ishidawataru/sctp v0.0.0-20230406120618-7ff4192f6ff2
Configuration menu - View commit details
-
Copy full SHA for 90e8a0b - Browse repository at this point
Copy the full SHA 90e8a0bView commit details -
vendor: github.com/moby/buildkit v0.10.7-0.20230412161310-d52b2d584242
Signed-off-by: Kevin Gentile <kevin.gentile@rockwellautomation.com>
Configuration menu - View commit details
-
Copy full SHA for 23774ad - Browse repository at this point
Copy the full SHA 23774adView commit details -
Fix argument quoting bugs in dockerd-rootless.sh
Signed-off-by: kpcyrd <git@rxv.cc> (cherry picked from commit 7fe0f73) Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Configuration menu - View commit details
-
Copy full SHA for 3731ce1 - Browse repository at this point
Copy the full SHA 3731ce1View commit details
Commits on Apr 14, 2023
-
Merge pull request #45331 from thaJeztah/23.0_backport_rootless_scrip…
…t_bugs [23.0 backport] Fix argument quoting bugs in dockerd-rootless.sh
Configuration menu - View commit details
-
Copy full SHA for 5f684cb - Browse repository at this point
Copy the full SHA 5f684cbView commit details -
Merge pull request #45330 from kevingentile/buildkit-3770
[23.0] vendor: github.com/moby/buildkit v0.10.7-0.20230412161310-d52b2d584242
Configuration menu - View commit details
-
Copy full SHA for cbce331 - Browse repository at this point
Copy the full SHA cbce331View commit details
There are no files selected for viewing