-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ISO: Update Docker from 20.10.18 to 20.10.20 #15159
Conversation
Waiting for ISO in #15155 to be merged before building ISO |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: medyagh, spowelljr The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
d179b5d
to
0604505
Compare
ok-to-build-iso |
Hi @spowelljr, we have updated your PR with the reference to newly built ISO. Pull the changes locally if you want to test with them or update your PR further. |
ok-to-build-iso |
1 similar comment
ok-to-build-iso |
Hi @spowelljr, we have updated your PR with the reference to newly built ISO. Pull the changes locally if you want to test with them or update your PR further. |
/ok-to-test |
kvm2 driver with docker runtime
Times for minikube ingress: 30.7s 29.7s 26.2s 27.2s 30.2s Times for minikube start: 55.5s 56.9s 55.5s 56.1s 55.7s docker driver with docker runtime
Times for minikube ingress: 22.0s 23.5s 22.5s 22.0s 21.5s Times for minikube (PR 15159) start: 28.1s 27.7s 28.1s 27.3s 28.1s docker driver with containerd runtime
Times for minikube (PR 15159) start: 23.1s 26.9s 24.1s 34.6s 25.7s Times for minikube (PR 15159) ingress: 37.0s 27.0s 27.0s 27.0s 27.0s |
These are the flake rates of all failed tests.
Too many tests failed - See test logs for more details. To see the flake rates of all tests by environment, click here. |
20.10.20
This release of Docker Engine contains partial mitigations for a Git vulnerability (CVE-2022-39253), and has updated handling of
image:tag@digest
image references.The Git vulnerability allows a maliciously crafted Git repository, when used as a build context, to copy arbitrary filesystem paths into resulting containers/images; this can occur in both the daemon, and in API clients, depending on the versions and tools in use.
The mitigations available in this release and in other consumers of the daemon API are partial and only protect users who build a Git URL context (e.g.
git+protocol://
). As the vulnerability could still be exploited by manually run Git commands that interact with and check out submodules, users should immediately upgrade to a patched version of Git to protect against this vulernability. Further details are available from the GitHub blog (“Git security vulnerabilities announced”).Client
Added a mitigation for CVE-2022-39253, when using the classic Builder with a Git URL as the build context.
Daemon
Updated handling of image:tag@digest references. When pulling an image using the image:tag@digest (“pull by digest”), image resolution happens through the content-addressable digest and the image and tag are not used. While this is expected, this could lead to confusing behavior, and could potentially be exploited through social engineering to run an image that is already present in the local image store. Docker now checks if the digest matches the repository name used to pull the image, and otherwise will produce an error.
Builder
Updated handling of image:tag@digest references. Refer to the “Daemon” section above for details.
Added a mitigation to the classic Builder and updated BuildKit to v0.8.3-31-gc0149372, for CVE-2022-39253.
Packaging
Update Docker Compose to v2.12.0.
https://docs.docker.com/engine/release-notes/#201020
20.10.19
Builder
Daemon
Packaging
https://docs.docker.com/engine/release-notes/#201019