Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: docker/cli
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v26.1.4
Choose a base ref
...
head repository: docker/cli
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: v26.1.5
Choose a head ref
  • 4 commits
  • 8 files changed
  • 3 contributors

Commits on Jun 13, 2024

  1. cli/command: more go1.19 ("predeclared any")

    Signed-off-by: Nick Sieger <[email protected]>
    (cherry picked from commit d0057db)
    Signed-off-by: Sebastiaan van Stijn <[email protected]>
    nicksieger authored and thaJeztah committed Jun 13, 2024
    Configuration menu
    Copy the full SHA
    5bab750 View commit details
    Browse the repository at this point in the history

Commits on Jun 17, 2024

  1. Merge pull request #5154 from thaJeztah/26.1_backport_goversion

    [26.1 backport] cli/command: more go1.19 ("predeclared any")
    vvoland authored Jun 17, 2024
    Configuration menu
    Copy the full SHA
    6eb67bf View commit details
    Browse the repository at this point in the history

Commits on Jul 3, 2024

  1. update to go1.21.12

    - https://github.com/golang/go/issues?q=milestone%3AGo1.21.12+label%3ACherryPickApproved
    - full diff: golang/go@go1.21.11...go1.21.12
    
    These minor releases include 1 security fixes following the security policy:
    
    net/http: denial of service due to improper 100-continue handling
    
    The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail.
    
    An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.
    
    Thanks to Geoff Franks for reporting this issue.
    
    This is CVE-2024-24791 and Go issue https://go.dev/issue/67555.
    View the release notes for more information:
    https://go.dev/doc/devel/release#go1.21.12
    
    **- Description for the changelog**
    
    ```markdown changelog
    Update Go runtime to 1.21.12
    ```
    
    Signed-off-by: Paweł Gronowski <[email protected]>
    (cherry picked from commit d73d7d4)
    Signed-off-by: Paweł Gronowski <[email protected]>
    vvoland committed Jul 3, 2024
    Configuration menu
    Copy the full SHA
    400f12f View commit details
    Browse the repository at this point in the history
  2. Merge pull request #5220 from vvoland/v26.1-5218

    [26.1 backport] update to go1.21.12
    thaJeztah authored Jul 3, 2024
    Configuration menu
    Copy the full SHA
    a72d7cd View commit details
    Browse the repository at this point in the history
Loading