Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): Bump the gomod group with 4 updates #418

Merged
merged 1 commit into from
Feb 5, 2024

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Feb 5, 2024

Bumps the gomod group with 4 updates: github.com/docker/cli, github.com/docker/docker, github.com/pterm/pterm and github.com/sigstore/cosign/v2.

Updates github.com/docker/cli from 25.0.1+incompatible to 25.0.2+incompatible

Commits

Updates github.com/docker/docker from 25.0.1+incompatible to 25.0.2+incompatible

Release notes

Sourced from github.com/docker/docker's releases.

v25.0.2

25.0.2

For a full list of pull requests and changes in this release, refer to the relevant GitHub milestones:

Security

This release contains security fixes for the following CVEs affecting Docker Engine and its components.

CVE Component Fix version Severity
CVE-2024-21626 runc 1.1.12 High, CVSS 8.6
CVE-2024-23651 BuildKit 1.12.5 High, CVSS 8.7
CVE-2024-23652 BuildKit 1.12.5 High, CVSS 8.7
CVE-2024-23653 BuildKit 1.12.5 High, CVSS 7.7
CVE-2024-23650 BuildKit 1.12.5 Medium, CVSS 5.5
CVE-2024-24557 Docker Engine 25.0.2 Medium, CVSS 6.9

The potential impacts of the above vulnerabilities include:

  • Unauthorized access to the host filesystem
  • Compromising the integrity of the build cache
  • In the case of CVE-2024-21626, a scenario that could lead to full container escape

For more information about the security issues addressed in this release, refer to the blog post. For details about each vulnerability, see the relevant security advisory:

Packaging updates

Commits
  • fce6e0c Merge pull request from GHSA-xw73-rw38-6vjc
  • d838e68 Merge pull request #47269 from thaJeztah/25.0_backport_bump_runc_binary_1.1.12
  • fa0d415 Merge pull request #47280 from thaJeztah/25.0_backport_bump_containerd_binary...
  • 06e22dc Merge pull request #47275 from vvoland/vendor-bk-0.12.5-25
  • b73ee94 Merge pull request #47274 from thaJeztah/25.0_backport_bump_runc_1.1.12
  • fd6a419 update containerd binary to v1.7.13
  • 13ce918 vendor: github.com/moby/buildkit v0.12.5
  • 4b63c47 vendor: github.com/opencontainers/runc v1.1.12
  • 4edb71b update runc binary to v1.1.12
  • 667bc3f Merge pull request #47265 from vvoland/ci-fix-makeps1-templatefail-25
  • Additional commits viewable in compare view

Updates github.com/pterm/pterm from 0.12.76 to 0.12.78

Release notes

Sourced from github.com/pterm/pterm's releases.

v0.12.78

What's Changed

Fixes 🔧

New Contributors

Full Changelog: pterm/pterm@v0.12.77...v0.12.78

v0.12.77

What's Changed

Fixes 🔧

New Contributors

Full Changelog: pterm/pterm@v0.12.76...v0.12.77

Commits

Updates github.com/sigstore/cosign/v2 from 2.2.2 to 2.2.3

Release notes

Sourced from github.com/sigstore/cosign/v2's releases.

v2.2.3

Bug Fixes

  • Fix race condition on verification with multiple signatures attached to image (#3486)
  • fix(clean): Fix clean cmd for private registries (#3446)
  • Fixed BYO PKI verification (#3427)

Features

  • Allow for option in cosign attest and attest-blob to upload attestation as supported in Rekor (#3466)
  • Add support for OpenVEX predicate type (#3405)

Documentation

  • Resolves #3088: version sub-command expected behaviour documentation and testing (#3447)
  • add examples for cosign attach signature cmd (#3468)

Misc

  • Remove CertSubject function (#3467)
  • Use local rekor and fulcio instances in e2e tests (#3478)

Full Changelog: sigstore/cosign@v2.2.2...v2.2.3

Changelog

Sourced from github.com/sigstore/cosign/v2's changelog.

v2.2.3

Bug Fixes

  • Fix race condition on verification with multiple signatures attached to image (#3486)
  • fix(clean): Fix clean cmd for private registries (#3446)
  • Fixed BYO PKI verification (#3427)

Features

  • Allow for option in cosign attest and attest-blob to upload attestation as supported in Rekor (#3466)
  • Add support for OpenVEX predicate type (#3405)

Documentation

  • Resolves #3088: version sub-command expected behaviour documentation and testing (#3447)
  • add examples for cosign attach signature cmd (#3468)

Misc

  • Remove CertSubject function (#3467)
  • Use local rekor and fulcio instances in e2e tests (#3478)

Contributors

  • aalsabag
  • Bob Callaway
  • Carlos Tadeu Panato Junior
  • Colleen Murphy
  • Hayden B
  • Mukuls77
  • Omri Bornstein
  • Puerco
  • vivek kumar sahu
Commits
  • 493e6e2 Add changelog for v2.2.3 (#3513)
  • 628df78 chore(deps): bump cpanato/vault-installer from 0.0.2 to 1.0.0 (#3510)
  • 7be8de0 chore(deps): bump google.golang.org/api from 0.157.0 to 0.159.0 (#3508)
  • 554015c chore(deps): bump the actions group with 3 updates (#3509)
  • 8395d97 chore(deps): bump github.com/go-openapi/runtime from 0.26.2 to 0.27.1 (#3507)
  • 1c90a3a chore(deps): bump github.com/open-policy-agent/opa from 0.60.0 to 0.61.0 (#3505)
  • 3f20bde chore(deps): bump github.com/buildkite/agent/v3 from 3.61.0 to 3.62.0 (#3506)
  • 5d79ebf chore(deps): bump the gomod group with 2 updates (#3504)
  • 381c657 fix cross test (#3502)
  • a445167 Fix CI test failing (#3501)
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions

@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Feb 5, 2024
@poiana poiana requested review from alacuku and loresuso February 5, 2024 04:38
@poiana poiana added the size/L label Feb 5, 2024
@dependabot dependabot bot force-pushed the dependabot/go_modules/gomod-f95ec77ba0 branch from e0a4559 to 8785cd1 Compare February 5, 2024 15:32
Bumps the gomod group with 4 updates: [github.com/docker/cli](https://github.com/docker/cli), [github.com/docker/docker](https://github.com/docker/docker), [github.com/pterm/pterm](https://github.com/pterm/pterm) and [github.com/sigstore/cosign/v2](https://github.com/sigstore/cosign).


Updates `github.com/docker/cli` from 25.0.1+incompatible to 25.0.2+incompatible
- [Commits](docker/cli@v25.0.1...v25.0.2)

Updates `github.com/docker/docker` from 25.0.1+incompatible to 25.0.2+incompatible
- [Release notes](https://github.com/docker/docker/releases)
- [Commits](moby/moby@v25.0.1...v25.0.2)

Updates `github.com/pterm/pterm` from 0.12.76 to 0.12.78
- [Release notes](https://github.com/pterm/pterm/releases)
- [Commits](pterm/pterm@v0.12.76...v0.12.78)

Updates `github.com/sigstore/cosign/v2` from 2.2.2 to 2.2.3
- [Release notes](https://github.com/sigstore/cosign/releases)
- [Changelog](https://github.com/sigstore/cosign/blob/main/CHANGELOG.md)
- [Commits](sigstore/cosign@v2.2.2...v2.2.3)

---
updated-dependencies:
- dependency-name: github.com/docker/cli
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: gomod
- dependency-name: github.com/docker/docker
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: gomod
- dependency-name: github.com/pterm/pterm
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: gomod
- dependency-name: github.com/sigstore/cosign/v2
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: gomod
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot force-pushed the dependabot/go_modules/gomod-f95ec77ba0 branch from 8785cd1 to a309e78 Compare February 5, 2024 15:45
Copy link
Member

@cpanato cpanato left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/approve
/lgtm

@poiana
Copy link
Contributor

poiana commented Feb 5, 2024

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: cpanato, dependabot[bot]

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@poiana
Copy link
Contributor

poiana commented Feb 5, 2024

LGTM label has been added.

Git tree hash: e2d506f57df55b91d7c810d4b76998229f86810f

@poiana poiana added the approved label Feb 5, 2024
@poiana poiana merged commit 3eb9295 into main Feb 5, 2024
14 checks passed
@poiana poiana deleted the dependabot/go_modules/gomod-f95ec77ba0 branch February 5, 2024 16:08
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved dco-signoff: yes dependencies Pull requests that update a dependency file go Pull requests that update Go code lgtm size/L
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants