mirror of
https://github.com/moby/moby.git
synced 2026-01-11 18:51:37 +00:00
This includes 1 security fix:
- net/http: CrossOriginProtection bypass patterns are over-broad
When passing patterns to CrossOriginProtection.AddInsecureBypassPattern,
requests that would have redirected to those patterns (e.g. without a trailing
slash) were also exempted, which might be unexpected.
Thanks to Marco Gazerro for reporting this issue.
This is CVE-2025-47910 and Go issue https://go.dev/issue/75054.
View the release notes for more information:
https://go.dev/doc/devel/release#go1.24.7
Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
25 lines
605 B
Docker
25 lines
605 B
Docker
# syntax=docker/dockerfile:1
|
|
|
|
ARG GO_VERSION=1.24.7
|
|
ARG GOVULNCHECK_VERSION=v1.1.4
|
|
ARG FORMAT=text
|
|
|
|
FROM golang:${GO_VERSION}-alpine AS base
|
|
WORKDIR /go/src/github.com/moby/moby
|
|
RUN apk add --no-cache jq moreutils
|
|
ARG GOVULNCHECK_VERSION
|
|
RUN --mount=type=cache,target=/root/.cache \
|
|
--mount=type=cache,target=/go/pkg/mod \
|
|
go install golang.org/x/vuln/cmd/govulncheck@$GOVULNCHECK_VERSION
|
|
|
|
FROM base AS run
|
|
ARG FORMAT
|
|
RUN --mount=type=bind,target=.,rw <<EOT
|
|
set -ex
|
|
mkdir /out
|
|
govulncheck -format ${FORMAT} ./... | tee /out/govulncheck.out
|
|
EOT
|
|
|
|
FROM scratch AS output
|
|
COPY --from=run /out /
|