Sourced from github.com/docker/docker's releases.
v24.0.7
24.0.7
For a full list of pull requests and changes in this release, refer to the relevant GitHub milestones:
Bug fixes and enhancements
- Write overlay2 layer metadata atomically. moby/moby#46703
- Fix "Rootful-in-Rootless" Docker-in-Docker on systemd version 250 and later. moby/moby#46626
- Fix
dockerd-rootless-setuptools.sh
when username contains a backslash. moby/moby#46407- Fix a bug that would prevent network sandboxes to be fully deleted when stopping containers with no network attachments and when
dockerd --bridge=none
is used. moby/moby#46702- Fix a bug where cancelling an API request could interrupt container restart. moby/moby#46697
- Fix an issue where containers would fail to start when providing
--ip-range
with a range larger than the subnet. docker/for-mac#6870- Fix data corruption with zstd output. moby/moby#46709
- Fix the conditions under which the container's MAC address is applied. moby/moby#46478
- Improve the performance of the stats collector. moby/moby#46448
- Fix an issue with source policy rules ending up in the wrong order. moby/moby#46441
Packaging updates
- Add support for Fedora 39 and Ubuntu 23.10. docker/docker-ce-packaging#940, docker/docker-ce-packaging#955
- Fix
docker.socket
not getting disabled when uninstalling thedocker-ce
RPM package. docker/docker-ce-packaging#852- Upgrade Go to
go1.20.10
. docker/docker-ce-packaging#951- Upgrade containerd to
v1.7.6
(static binaries only). moby/moby#46103- Upgrade the
containerd.io
package tov1.6.24
.Security
- Deny containers access to
/sys/devices/virtual/powercap
by default. This change hardens against CVE-2020-8694, CVE-2020-8695, and CVE-2020-12912, and an attack known as the PLATYPUS attack. For more details, see advisory, commit.v24.0.6
24.0.6
For a full list of pull requests and changes in this release, refer to the relevant GitHub milestones:
Bug fixes and enhancements
- containerd storage backend: Fix
docker ps
failing when a container image is no longer present in the content store. moby/moby#46095- containerd storage backend: Fix
docker ps -s -a
anddocker container prune
failing when a container image config is no longer present in the content store. moby/moby#46097- containerd storage backend: Fix
docker inspect
failing when a container image config is no longer (or was never) present in the content store. moby/moby#46244- containerd storage backend: Fix diff and export with the
overlayfs
snapshotter by using reference-counted rootfs mounts. moby/moby#46266- containerd storage backend: Fix a misleading error message when the image platforms available locally do not match the desired platform. moby/moby#46300
- containerd storage backend: Fix the
FROM scratch
Dockerfile instruction with the classic builder. moby/moby#46302- containerd storage backend: Fix
mismatched image rootfs and manifest layers
errors with the classic builder. moby/moby#46310
... (truncated)
311b9ff
Merge pull request #46697
from thaJeztah/24.0_backport_restart_nocancelaf60804
Merge pull request from GHSA-jq35-85cj-fj4p3cf363e
Merge pull request #46709
from thaJeztah/24.0_backport_bump_compress05d7386
daemon: daemon.containerRestart: don't cancel restart on context
cancel649c944
Merge pull request #46703
from thaJeztah/24.0_backport_atomic-layer-data-write9b20b1a
Merge pull request #46702
from thaJeztah/24.0_backport_releaseNetwork_Network...dd37b0b
vendor: github.com/klauspost/compress v1.17.27058c0d
vendor: github.com/klauspost/compress v1.16.557bd388
daemon: overlay2: Write layer metadata atomically05d95fd
daemon: release sandbox even when NetworkDisabledSourced from github.com/nats-io/nkeys's releases.
v0.4.5
What's Changed
- [CI] bump staticcheck GHAction by
@philpennock
in nats-io/nkeys#49- [FIX] added windows binary by
@aricart
in nats-io/nkeys#51- [FIX] YAML Enginering: quote go-version string by
@philpennock
in nats-io/nkeys#53- [FEAT] Use readKeyFile to read both seed file and public key file by
@nanjj
in nats-io/nkeys#54- [FEAT] Made
decode
a little fast by@nanjj
in nats-io/nkeys#55- [REPO] Add issue forms by
@bruth
in nats-io/nkeys#56- [FIX] added binaries to match nats-server by
@aricart
in nats-io/nkeys#58Full Changelog: https://github.com/nats-io/nkeys/compare/v0.4.4...v0.4.5
62e5d8c
Merge pull request #60 from
nats-io/0_4_6f63761b
[BUMP] release version and dependenciesd2e442e
Merge pull request #59 from
nats-io/empty58fb9d6
Make sure to use byte slice to receive proper copy, otherwise empty
public ke...3e454c8
Merge pull request #58 from
nats-io/arch-bins53c0777
bump go to 1.21.xd935834
bump version number6b488b3
[FIX] added binaries to match nats-server9fb4151
Merge pull request #56 from
nats-io/add-issue-forms4647ec0
Fix issue config discussions linkcb227cd
tiff: limit work when decoding malicious imagesa5392f0
bmp: support to decode 8-bit format with up to 256 color palettef9550b0
go.mod: update golang.org/x dependencies81c166c
go.mod: update golang.org/x dependenciesed5dba0
go.mod: update golang.org/x dependencies08ca817
font: have Glyph return !ok for U+FFFD substituteb6ac75b
go.mod: update golang.org/x dependencies1b74412
font/sfnt: set type for all NameID constantsf632f7f
tiff, tiff/lzw, vector: use single space in comments9d2ee97
ssh: implement strict KEX protocol changes4e5a261
ssh: close net.Conn on all NewServerConn errors152cdb1
x509roots/fallback: update bundlefdfe1f8
ssh: defer channel window adjustmentb8ffc16
blake2b: drop Go 1.6, Go 1.8 compatibility7e6fbd8
ssh: wrap errors from client handshakebda2f3f
argon2: avoid clobbering BP325b735
ssh/test: skip TestSSHCLIAuth on Windows1eadac5
go.mod: update golang.org/x dependenciesb2d7c26
ssh: add (*Client).DialContext methodSourced from github.com/quic-go/quic-go's releases.
v0.37.7
This release contains fixes for the Honeybadger vulnerability (CVE-2023-49295):
- limit the number of queued PATH_RESPONSE frames to 256 (#4199)
- don't retransmit PATH_CHALLENGE and PATH_RESPONSE frames (#4200)
Full Changelog: https://github.com/quic-go/quic-go/compare/v0.37.6...v0.37.7
v0.37.6
This patch release contains a backport of quic-go/quic-go#4038.
Full Changelog: https://github.com/quic-go/quic-go/compare/v0.37.5...v0.37.6
v0.37.5
This patch release contains the backport of 3 fixes:
- fix handshake failure if
tls.Config.SessionTicketDisabled = false
, buttls.Config.GetConfigForClient
returns a config that disables session tickets: #4030- use the correct hash function for TLS_AES_256_GCM_SHA384: #4031
- automatically set the
tls.Config.ServerName
: #4032Full Changelog: https://github.com/quic-go/quic-go/compare/v0.37.4...v0.37.5
21609dd
don't retransmit PATH_CHALLENGE and PATH_RESPONSE frames (#4200)d7aa627
limit the number of queued PATH_RESPONSE frames to 256 (#4199)e2c360c
reassemble post-handshake TLS messages before passing them to crypto/tls
(#4038)e9f7f46
automatically set the tls.Config.ServerName if unset (#4032)12d84c4
handshake: use the correct hash function for TLS_AES_256_GCM_SHA384 (#4031)b1635df
ignore QUICConn.SendSessionTicket error if session tickets are disabled
(#4030)