intelops / genval

Simplifies configuration management for a wide range of tools, including Dockerfile, Kubernetes manifests, and other infrastructure files.
Apache License 2.0
6 stars 5 forks source link

Upgrade: Bump github.com/docker/docker from 26.1.4+incompatible to 26.1.5+incompatible #156

Closed dependabot[bot] closed 2 months ago

dependabot[bot] commented 2 months ago

Bumps github.com/docker/docker from 26.1.4+incompatible to 26.1.5+incompatible.

Release notes

Sourced from github.com/docker/docker's releases.

v26.1.5

26.1.5

Security

This release contains a fix for CVE-2024-41110 / GHSA-v23v-6jw2-98fq that impacted setups using authorization plugins (AuthZ) for access control. No other changes are included in this release, and this release is otherwise identical for users not using AuthZ plugins.

Full Changelog: https://github.com/moby/moby/compare/v26.1.4...v26.1.5

Commits
  • 411e817 Merge commit from fork
  • 9cc85ea If url includes scheme, urlPath will drop hostname, which would not match the...
  • 820cab9 Authz plugin security fixes for 0-length content and path validation
  • 6bc4906 Merge pull request #48123 from vvoland/v26.1-48120
  • 6fbdce4 update to go1.21.12
  • f533464 Merge pull request #47986 from vvoland/v26.1-47985
  • c1d4587 builder/mobyexporter: Add missing nil check
  • d642804 Merge pull request #47940 from thaJeztah/26.1_backport_api_remove_container_c...
  • daba246 docs: api: image inspect: remove Container and ContainerConfig
  • See full diff in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/intelops/genval/network/alerts).
dryrunsecurity[bot] commented 2 months ago

DryRun Security Summary

This pull request updates the github.com/docker/docker dependency from version 26.1.4+incompatible to 26.1.5+incompatible, which is a minor version update typically indicating bug fixes or minor improvements, and it is recommended to review the changes for any potential security implications and keep dependencies up-to-date to mitigate the risk of known vulnerabilities.

Expand for full summary
**Summary:** The code changes in this pull request are primarily focused on updating the version of the `github.com/docker/docker` dependency from `26.1.4+incompatible` to `26.1.5+incompatible` in the `go.mod` and `go.sum` files. This is a minor version update, which typically indicates bug fixes or minor improvements rather than significant changes. From an application security perspective, it's important to review any dependency updates to ensure that they don't introduce new vulnerabilities or security issues. In this case, the update appears to be a routine maintenance task, and there are no immediate security concerns. However, it's still a good practice to review the changelog or release notes for the new version to understand any potential security implications. Additionally, it's recommended to keep the project's dependencies up-to-date, as older versions may have known security vulnerabilities that could be exploited. Regularly updating dependencies can help mitigate this risk. **Files Changed:** 1. `go.mod`: The `go.mod` file has been updated to use the `26.1.5+incompatible` version of the `github.com/docker/docker` dependency, replacing the previous `26.1.4+incompatible` version. 2. `go.sum`: The `go.sum` file has been updated to reflect the new version of the `github.com/docker/docker` dependency.

Code Analysis

We ran 9 analyzers against 2 files and 1 analyzer had findings. 8 analyzers had no findings.

Analyzer Findings
Sensitive Files Analyzer 2 findings

Riskiness

:green_circle: Risk threshold not exceeded.

View PR in the DryRun Dashboard.