Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: docker/cli
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v27.5.0
Choose a base ref
...
head repository: docker/cli
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: v27.5.1
Choose a head ref
  • 9 commits
  • 13 files changed
  • 3 contributors

Commits on Jan 20, 2025

  1. vendor: github.com/docker/docker v27.5.0

    no diff: same commit, but tagged; moby/moby@38b84dc...v27.5.0
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Jan 20, 2025
    Configuration menu
    Copy the full SHA
    397c2f8 View commit details
    Browse the repository at this point in the history
  2. update to go1.22.11 (fix CVE-2024-45341, CVE-2024-45336)

    go1.22.11 (released 2025-01-16) includes security fixes to the crypto/x509 and
    net/http packages, as well as bug fixes to the runtime. See the Go 1.22.11
    milestone on our issue tracker for details.
    
    - https://github.com/golang/go/issues?q=milestone%3AGo1.22.11+label%3ACherryPickApproved
    - full diff: golang/go@go1.22.10...go1.22.11
    
    Hello gophers,
    
    We have just released Go versions 1.23.5 and 1.22.11, minor point releases.
    
    These minor releases include 2 security fixes following the security policy:
    
    - crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints
    
      A certificate with a URI which has a IPv6 address with a zone ID may
      incorrectly satisfy a URI name constraint that applies to the certificate
      chain.
    
      Certificates containing URIs are not permitted in the web PKI, so this
      only affects users of private PKIs which make use of URIs.
    
      Thanks to Juho Forsén of Mattermost for reporting this issue.
    
      This is CVE-2024-45341 and Go issue https://go.dev/issue/71156.
    
    - net/http: sensitive headers incorrectly sent after cross-domain redirect
    
      The HTTP client drops sensitive headers after following a cross-domain redirect.
      For example, a request to a.com/ containing an Authorization header which is
      redirected to b.com/ will not send that header to b.com.
    
      In the event that the client received a subsequent same-domain redirect, however,
      the sensitive headers would be restored. For example, a chain of redirects from
      a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization
      header to b.com/2.
    
      Thanks to Kyle Seely for reporting this issue.
    
      This is CVE-2024-45336 and Go issue https://go.dev/issue/70530.
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Jan 20, 2025
    Configuration menu
    Copy the full SHA
    1ccfae7 View commit details
    Browse the repository at this point in the history
  3. gha: Adjust release branches

    Adjust all workflows to also run on branches like `27.x`
    
    Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
    (cherry picked from commit 81b0bb5)
    Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
    vvoland committed Jan 20, 2025
    Configuration menu
    Copy the full SHA
    fa1ba05 View commit details
    Browse the repository at this point in the history
  4. Merge pull request #5764 from vvoland/5763-27.x

    [27.x backport] gha: Adjust release branches
    thaJeztah authored Jan 20, 2025
    Configuration menu
    Copy the full SHA
    092d235 View commit details
    Browse the repository at this point in the history

Commits on Jan 21, 2025

  1. Dockerfile: update buildx to v0.20.0

    Update the buildx cli plugin used in the dev-container
    
    full diff: https://github.com/docker/buildx/compare/v0.18.0..v0.20.0
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    (cherry picked from commit 7b07242)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Jan 21, 2025
    Configuration menu
    Copy the full SHA
    777695f View commit details
    Browse the repository at this point in the history
  2. Dockerfile: update compose to v2.32.4

    Update the compose cli plugin used in the dev-container
    
    full diff: docker/compose@v2.30.3...v2.32.4
    
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    (cherry picked from commit 1546f02)
    Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
    thaJeztah committed Jan 21, 2025
    Configuration menu
    Copy the full SHA
    fbc0a73 View commit details
    Browse the repository at this point in the history
  3. Merge pull request #5766 from thaJeztah/27.x_backport_bump_dev_tools

    [27.x backport] Dockerfile: dev-container: update buildx v0.20.0, compose v2.32.4
    vvoland authored Jan 21, 2025
    Configuration menu
    Copy the full SHA
    0e2d4fe View commit details
    Browse the repository at this point in the history
  4. Merge pull request #5762 from thaJeztah/27.x_bump_golang_1.22.11

    [27.x] update to go1.22.11 (fix CVE-2024-45341, CVE-2024-45336)
    vvoland authored Jan 21, 2025
    Configuration menu
    Copy the full SHA
    d7cd22f View commit details
    Browse the repository at this point in the history
  5. Merge pull request #5759 from thaJeztah/27.x_vendor_docker_27.5.0

    [27.x] vendor: github.com/docker/docker v27.5.0
    thaJeztah authored Jan 21, 2025
    Configuration menu
    Copy the full SHA
    9f9e405 View commit details
    Browse the repository at this point in the history
Loading