Closed renovate[bot] closed 2 years ago
Totals | |
---|---|
Change from base Build 742037759: | 0.0% |
Covered Lines: | 162 |
Relevant Lines: | 240 |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.
This PR contains the following updates:
v20.10.6+incompatible
->v20.10.9
Release Notes
docker/docker
### [`v20.10.9`](https://togithub.com/docker/docker/releases/v20.10.9) [Compare Source](https://togithub.com/docker/docker/compare/v20.10.8...v20.10.9) This release is a security release with security fixes in the CLI, runtime, as well as updated versions of the containerd.io package and the Go runtime. #### Client - [CVE-2021-41092](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41092) Ensure default auth config has address field set, to prevent credentials being sent to the default registry. #### Runtime - [CVE-2021-41089](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41089) Create parent directories inside a chroot during `docker cp` to prevent a specially crafted container from changing permissions of existing files in the host’s filesystem. - [CVE-2021-41091](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41091) Lock down file permissions to prevent unprivileged users from discovering and executing programs in `/var/lib/docker`. #### Packaging - Update Golang runtime to Go 1.16.8, which contains fixes for [CVE-2021-36221](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36221) and [CVE-2021-39293](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39293) - Update static binaries and containerd.io rpm and deb packages to containerd v1.4.11 and runc v1.0.2 to address [CVE-2021-41103](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41103). - Update the bundled buildx version to v0.6.3 for rpm and deb packages. ### [`v20.10.8`](https://togithub.com/docker/docker/releases/v20.10.8) [Compare Source](https://togithub.com/docker/docker/compare/v20.10.7...v20.10.8) #### 20.10.8 > **IMPORTANT** > > Due to [net/http changes](https://togithub.com/golang/go/issues/40909) in [Go 1.16](https://golang.org/doc/go1.16#net/http), HTTP proxies configured through the `$HTTP_PROXY` environment variable are no longer used for TLS (`https://`) connections. Make sure you also set an `$HTTPS_PROXY` environment variable for handling requests to `https://` URLs. Refer to the [HTTP/HTTPS proxy section in the documentation](https://docs.docker.com/config/daemon/systemd/#httphttps-proxy) to learn how to configure the Docker Daemon to use a proxy server. ##### Deprecation - Deprecate support for encrypted TLS private keys. Legacy PEM encryption as specified in RFC 1423 is insecure by design. Because it does not authenticate the ciphertext, it is vulnerable to padding oracle attacks that can let an attacker recover the plaintext. Support for encrypted TLS private keys is now marked as deprecated, and will be removed in an upcoming release. [docker/cli#3219](https://togithub.com/docker/cli/pull/3219) - Deprecate Kubernetes stack support. Following the deprecation of [Compose on Kubernetes](https://togithub.com/docker/compose-on-kubernetes), support for Kubernetes in the `stack` and `context` commands in the Docker CLI is now marked as deprecated, and will be removed in an upcoming release [docker/cli#3174](https://togithub.com/docker/cli/pull/3174). ##### Client - Fix `Invalid standard handle identifier` errors on Windows [docker/cli#3132](https://togithub.com/docker/cli/pull/3132). ##### Rootless - Avoid `can't open lock file /run/xtables.lock: Permission denied` error on SELinux hosts [moby/moby#42462](https://togithub.com/moby/moby/pull/42462). - Disable overlay2 when running with SELinux to prevent permission denied errors [moby/moby#42462](https://togithub.com/moby/moby/pull/42462). - Fix `x509: certificate signed by unknown authority` error on openSUSE Tumbleweed [moby/moby#42462](https://togithub.com/moby/moby/pull/42462). ##### Runtime - Print a warning when using the `--platform` option to pull a single-arch image that does not match the specified architecture [moby/moby#42633](https://togithub.com/moby/moby/pull/42633). - Fix incorrect `Your kernel does not support swap memory limit` warning when running with cgroups v2 [moby/moby#42479](https://togithub.com/moby/moby/pull/42479). - Windows: Fix a situation where containers were not stopped if `HcsShutdownComputeSystem` returned an `ERROR_PROC_NOT_FOUND` error [moby/moby#42613](https://togithub.com/moby/moby/pull/42613) #### Swarm - Fix a possibility where overlapping IP addresses could exist as a result of the node failing to clean up its old loadbalancer IPs [moby/moby#42538](https://togithub.com/moby/moby/pull/42538) - Fix a deadlock in log broker ("dispatcher is stopped") [moby/moby#42537](https://togithub.com/moby/moby/pull/42537) ##### Packaging > **Known issue** > > The `ctr` binary shipping with the static packages of this release is not > statically linked, and will not run in Docker images using alpine as a base > image. Users can install the `libc6-compat` package, or download a previous > version of the `ctr` binary as a workaround. Refer to the containerd ticket > related to this issue for more details: [containerd/containerd#5824](https://togithub.com/containerd/containerd/issues/5824). - Remove packaging for Ubuntu 16.04 "Xenial" and Fedora 32, as they reached EOL [docker/docker-ce-packaging#560](https://togithub.com/docker/docker-ce-packaging/pull/560) - Update Golang runtime to Go 1.16.6 - Update the bundled buildx version to v0.6.1 for rpm and deb packages [docker/docker-ce-packaging#562](https://togithub.com/docker/docker-ce-packaging/pull/562) - Update static binaries and containerd.io rpm and deb packages to containerd v1.4.9 and runc v1.0.1: [docker/containerd-packaging#241](https://togithub.com/docker/containerd-packaging/pull/241), [docker/containerd-packaging#245](https://togithub.com/docker/containerd-packaging/pull/245), [docker/containerd-packaging#247](https://togithub.com/docker/containerd-packaging/pull/247). ### [`v20.10.7`](https://togithub.com/docker/docker/releases/v20.10.7) [Compare Source](https://togithub.com/docker/docker/compare/v20.10.6...v20.10.7) #### 20.10.7 ##### Client - Suppress warnings for deprecated cgroups [docker/cli#3099](https://togithub.com/docker/cli/pull/3099). - Prevent sending `SIGURG` signals to container on Linux and macOS. The Go runtime (starting with Go 1.14) uses `SIGURG` signals internally as an interrupt to support preemptable syscalls. In situations where the Docker CLI was attached to a container, these interrupts were forwarded to the container. This fix changes the Docker CLI to ignore `SIGURG` signals [docker/cli#3107](https://togithub.com/docker/cli/pull/3107), [moby/moby#42421](https://togithub.com/moby/moby/pull/42421). ##### Builder - Update BuildKit to version v0.8.3-3-g244e8cde [moby/moby#42448](https://togithub.com/moby/moby/pull/42448): - Transform relative mountpoints for exec mounts in the executor to work around a breaking change in runc v1.0.0-rc94 and up. [moby/buildkit#2137](https://togithub.com/moby/buildkit/pull/2137). - Add retry on image push 5xx errors. [moby/buildkit#2043](https://togithub.com/moby/buildkit/pull/2043). - Fix build-cache not being invalidated when renaming a file that is copied using a `COPY` command with a wildcard. Note that this change invalidates existing build caches for copy commands that use a wildcard. [moby/buildkit#2018](https://togithub.com/moby/buildkit/pull/2018). - Fix build-cache not being invalidated when using mounts [moby/buildkit#2076](https://togithub.com/moby/buildkit/pull/2076). - Fix build failures when `FROM` image is not cached when using legacy schema 1 images [moby/moby#42382](https://togithub.com/moby/moby/pull/42382). ##### Logging - Update the hcsshim SDK to make daemon logs on Windows less verbose [moby/moby#42292](https://togithub.com/moby/moby/pull/42292). ##### Rootless - Fix capabilities not being honored when an image was built on a daemon with user-namespaces enabled [moby/moby#42352](https://togithub.com/moby/moby/pull/42352). ##### Networking - Update libnetwork to fix publishing ports on environments with kernel boot parameter `ipv6.disable=1`, and to fix a deadlock causing internal DNS lookups to fail [moby/moby#42413](https://togithub.com/moby/moby/pull/42413). ##### Contrib - Update rootlesskit to v0.14.2 to fix a timeout when starting the userland proxy with the `slirp4netns` port driver [moby/moby#42294](https://togithub.com/moby/moby/pull/42294). - Fix "Device or resource busy" errors when running docker-in-docker on a rootless daemon [moby/moby#42342](https://togithub.com/moby/moby/pull/42342). ##### Packaging - Update containerd to v1.4.6, runc v1.0.0-rc95 to address [CVE-2021-30465](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30465) [moby/moby#42398](https://togithub.com/moby/moby/pull/42398), [moby/moby#42395](https://togithub.com/moby/moby/pull/42395), [ocker/containerd-packaging#234](https://togithub.com/docker/containerd-packaging/pull/234) - Update containerd to v1.4.5, runc v1.0.0-rc94 [moby/moby#42372](https://togithub.com/moby/moby/pull/42372), [moby/moby#42388](https://togithub.com/moby/moby/pull/42388), [docker/containerd-packaging#232](https://togithub.com/docker/containerd-packaging/pull/232). - Update Docker Scan plugin packages (`docker-scan-plugin`) to v0.8 [docker/docker-ce-packaging#545](https://togithub.com/docker/docker-ce-packaging/pull/545).Configuration
📅 Schedule: At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by WhiteSource Renovate. View repository job log here.