⬆️ Bump the go_modules group across 2 directories with 2 updates
Bumps the go_modules group with 1 update in the /examples/simple-plugin directory: github.com/docker/docker. Bumps the go_modules group with 2 updates in the /tools directory: github.com/docker/docker and github.com/golang-jwt/jwt/v4.
Updates github.com/docker/docker from 26.1.0+incompatible to 26.1.5+incompatible
Release notes
Sourced from github.com/docker/docker's releases.
v26.1.5
26.1.5
Security
This release contains a fix for CVE-2024-41110 / GHSA-v23v-6jw2-98fq that impacted setups using authorization plugins (AuthZ) for access control. No other changes are included in this release, and this release is otherwise identical for users not using AuthZ plugins.
Full Changelog: https://github.com/moby/moby/compare/v26.1.4...v26.1.5
v26.1.4
26.1.4
For a full list of pull requests and changes in this release, refer to the relevant GitHub milestones:
- docker/cli, 26.1.4 milestone
- moby/moby, 26.1.4 milestone
- Deprecated and removed features, see Deprecated Features.
- Changes to the Engine API, see API version history.
Security
This release updates the Go runtime to 1.21.11 which contains security fixes for:
- CVE-2024-24789
- CVE-2024-24790
- A symlink time of check to time of use race condition during directory removal reported by Addison Crump (
@addisoncrump).Bug fixes and enhancements
- Fixed an issue where promoting a node immediately after another node was demoted could cause the promotion to fail. moby/moby#47870
- Prevent the daemon log from being spammed with
superfluous response.WriteHeader call ...messages.. moby/moby#47843- Don't show empty hints when plugins return an empty hook message. docker/cli#5083
- Added
ContextType: "moby"to the context list/inspect output to address a compatibility issue with Visual Studio Container Tools. docker/cli#5095- Fix a compatibility issue with Visual Studio Container Tools. docker/cli#5095
Packaging updates
- Update containerd (static binaries only) to v1.7.17. moby/moby#47841
- CVE-2024-24789, CVE-2024-24790: Update Go runtime to 1.21.11. moby/moby#47904
- Update Compose to v2.27.1. docker/docker-ce-packages#1022
- Update Buildx to v0.14.1. docker/docker-ce-packages#1021
v26.1.3
26.1.3
... (truncated)
Commits
411e817Merge commit from fork9cc85eaIf url includes scheme, urlPath will drop hostname, which would not match the...820cab9Authz plugin security fixes for 0-length content and path validation6bc4906Merge pull request #48123 from vvoland/v26.1-481206fbdce4update to go1.21.12f533464Merge pull request #47986 from vvoland/v26.1-47985c1d4587builder/mobyexporter: Add missing nil checkd642804Merge pull request #47940 from thaJeztah/26.1_backport_api_remove_container_c...daba246docs: api: image inspect: remove Container and ContainerConfigde5c9cfMerge pull request #47912 from thaJeztah/26.1_backport_vendor_containerd_1.7.18- Additional commits viewable in compare view
Updates github.com/docker/docker from 26.0.2+incompatible to 26.1.5+incompatible
Release notes
Sourced from github.com/docker/docker's releases.
v26.1.5
26.1.5
Security
This release contains a fix for CVE-2024-41110 / GHSA-v23v-6jw2-98fq that impacted setups using authorization plugins (AuthZ) for access control. No other changes are included in this release, and this release is otherwise identical for users not using AuthZ plugins.
Full Changelog: https://github.com/moby/moby/compare/v26.1.4...v26.1.5
v26.1.4
26.1.4
For a full list of pull requests and changes in this release, refer to the relevant GitHub milestones:
- docker/cli, 26.1.4 milestone
- moby/moby, 26.1.4 milestone
- Deprecated and removed features, see Deprecated Features.
- Changes to the Engine API, see API version history.
Security
This release updates the Go runtime to 1.21.11 which contains security fixes for:
- CVE-2024-24789
- CVE-2024-24790
- A symlink time of check to time of use race condition during directory removal reported by Addison Crump (
@addisoncrump).Bug fixes and enhancements
- Fixed an issue where promoting a node immediately after another node was demoted could cause the promotion to fail. moby/moby#47870
- Prevent the daemon log from being spammed with
superfluous response.WriteHeader call ...messages.. moby/moby#47843- Don't show empty hints when plugins return an empty hook message. docker/cli#5083
- Added
ContextType: "moby"to the context list/inspect output to address a compatibility issue with Visual Studio Container Tools. docker/cli#5095- Fix a compatibility issue with Visual Studio Container Tools. docker/cli#5095
Packaging updates
- Update containerd (static binaries only) to v1.7.17. moby/moby#47841
- CVE-2024-24789, CVE-2024-24790: Update Go runtime to 1.21.11. moby/moby#47904
- Update Compose to v2.27.1. docker/docker-ce-packages#1022
- Update Buildx to v0.14.1. docker/docker-ce-packages#1021
v26.1.3
26.1.3
... (truncated)
Commits
411e817Merge commit from fork9cc85eaIf url includes scheme, urlPath will drop hostname, which would not match the...820cab9Authz plugin security fixes for 0-length content and path validation6bc4906Merge pull request #48123 from vvoland/v26.1-481206fbdce4update to go1.21.12f533464Merge pull request #47986 from vvoland/v26.1-47985c1d4587builder/mobyexporter: Add missing nil checkd642804Merge pull request #47940 from thaJeztah/26.1_backport_api_remove_container_c...daba246docs: api: image inspect: remove Container and ContainerConfigde5c9cfMerge pull request #47912 from thaJeztah/26.1_backport_vendor_containerd_1.7.18- Additional commits viewable in compare view
Updates github.com/golang-jwt/jwt/v4 from 4.5.0 to 4.5.1
Release notes
Sourced from github.com/golang-jwt/jwt/v4's releases.
v4.5.1
Security
Unclear documentation of the error behavior in
ParseWithClaimsin <= 4.5.0 could lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned byParseWithClaimsreturn both error codes. If users only check for thejwt.ErrTokenExpiredusingerror.Is, they will ignore the embeddedjwt.ErrTokenSignatureInvalidand thus potentially accept invalid tokens.This issue was documented in https://github.com/golang-jwt/jwt/security/advisories/GHSA-29wx-vh33-7x7r and fixed in this release.
Note:
v5was not affected by this issue. So upgrading to this release version is also recommended.What's Changed
- Back-ported error-handling logic in
ParseWithClaimsfromv5branch. This fixes https://github.com/golang-jwt/jwt/security/advisories/GHSA-29wx-vh33-7x7r.Full Changelog: https://github.com/golang-jwt/jwt/compare/v4.5.0...v4.5.1
Commits
7b1c1c0Merge commit from fork- See full diff in compare view
You can trigger a rebase of this PR by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebasewill rebase this PR -
@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it -
@dependabot mergewill merge this PR after your CI passes on it -
@dependabot squash and mergewill squash and merge this PR after your CI passes on it -
@dependabot cancel mergewill cancel a previously requested merge and block automerging -
@dependabot reopenwill reopen this PR if it is closed -
@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency -
@dependabot ignore <dependency name> major versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself) -
@dependabot ignore <dependency name> minor versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself) -
@dependabot ignore <dependency name>will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself) -
@dependabot unignore <dependency name>will remove all of the ignore conditions of the specified dependency -
@dependabot unignore <dependency name> <ignore condition>will remove the ignore condition of the specified dependency and ignore conditions You can disable automated security fix PRs for this repo from the Security Alerts page.
Note Automatic rebases have been disabled on this pull request as it has been open for over 30 days.
This pr is stale because it has been open 30 days with no activity. Remove stale label or comment or this will be closed in 7 days.