-
Notifications
You must be signed in to change notification settings - Fork 2k
Comparing changes
Open a pull request
base repository: docker/cli
base: v27.5.0
head repository: docker/cli
compare: v27.5.1
- 9 commits
- 13 files changed
- 3 contributors
Commits on Jan 20, 2025
-
vendor: github.com/docker/docker v27.5.0
no diff: same commit, but tagged; moby/moby@38b84dc...v27.5.0 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Configuration menu - View commit details
-
Copy full SHA for 397c2f8 - Browse repository at this point
Copy the full SHA 397c2f8View commit details -
update to go1.22.11 (fix CVE-2024-45341, CVE-2024-45336)
go1.22.11 (released 2025-01-16) includes security fixes to the crypto/x509 and net/http packages, as well as bug fixes to the runtime. See the Go 1.22.11 milestone on our issue tracker for details. - https://github.com/golang/go/issues?q=milestone%3AGo1.22.11+label%3ACherryPickApproved - full diff: golang/go@go1.22.10...go1.22.11 Hello gophers, We have just released Go versions 1.23.5 and 1.22.11, minor point releases. These minor releases include 2 security fixes following the security policy: - crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs. Thanks to Juho Forsén of Mattermost for reporting this issue. This is CVE-2024-45341 and Go issue https://go.dev/issue/71156. - net/http: sensitive headers incorrectly sent after cross-domain redirect The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2. Thanks to Kyle Seely for reporting this issue. This is CVE-2024-45336 and Go issue https://go.dev/issue/70530. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Configuration menu - View commit details
-
Copy full SHA for 1ccfae7 - Browse repository at this point
Copy the full SHA 1ccfae7View commit details -
Adjust all workflows to also run on branches like `27.x` Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com> (cherry picked from commit 81b0bb5) Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
Configuration menu - View commit details
-
Copy full SHA for fa1ba05 - Browse repository at this point
Copy the full SHA fa1ba05View commit details -
Merge pull request #5764 from vvoland/5763-27.x
[27.x backport] gha: Adjust release branches
Configuration menu - View commit details
-
Copy full SHA for 092d235 - Browse repository at this point
Copy the full SHA 092d235View commit details
Commits on Jan 21, 2025
-
Dockerfile: update buildx to v0.20.0
Update the buildx cli plugin used in the dev-container full diff: https://github.com/docker/buildx/compare/v0.18.0..v0.20.0 Signed-off-by: Sebastiaan van Stijn <github@gone.nl> (cherry picked from commit 7b07242) Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Configuration menu - View commit details
-
Copy full SHA for 777695f - Browse repository at this point
Copy the full SHA 777695fView commit details -
Dockerfile: update compose to v2.32.4
Update the compose cli plugin used in the dev-container full diff: docker/compose@v2.30.3...v2.32.4 Signed-off-by: Sebastiaan van Stijn <github@gone.nl> (cherry picked from commit 1546f02) Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Configuration menu - View commit details
-
Copy full SHA for fbc0a73 - Browse repository at this point
Copy the full SHA fbc0a73View commit details -
Merge pull request #5766 from thaJeztah/27.x_backport_bump_dev_tools
[27.x backport] Dockerfile: dev-container: update buildx v0.20.0, compose v2.32.4
Configuration menu - View commit details
-
Copy full SHA for 0e2d4fe - Browse repository at this point
Copy the full SHA 0e2d4feView commit details -
Merge pull request #5762 from thaJeztah/27.x_bump_golang_1.22.11
[27.x] update to go1.22.11 (fix CVE-2024-45341, CVE-2024-45336)
Configuration menu - View commit details
-
Copy full SHA for d7cd22f - Browse repository at this point
Copy the full SHA d7cd22fView commit details -
Merge pull request #5759 from thaJeztah/27.x_vendor_docker_27.5.0
[27.x] vendor: github.com/docker/docker v27.5.0
Configuration menu - View commit details
-
Copy full SHA for 9f9e405 - Browse repository at this point
Copy the full SHA 9f9e405View commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff v27.5.0...v27.5.1