Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): bump github.com/docker/docker from 20.10.8+incompatible to 20.10.9+incompatible #4

Conversation

dependabot[bot]
Copy link

@dependabot dependabot bot commented on behalf of github Oct 4, 2021

Bumps github.com/docker/docker from 20.10.8+incompatible to 20.10.9+incompatible.

Release notes

Sourced from github.com/docker/docker's releases.

v20.10.9

This release is a security release with security fixes in the CLI, runtime, as well as updated versions of the containerd.io package and the Go runtime.

Client

  • CVE-2021-41092 Ensure default auth config has address field set, to prevent credentials being sent to the default registry.

Runtime

  • CVE-2021-41089 Create parent directories inside a chroot during docker cp to prevent a specially crafted container from changing permissions of existing files in the host’s filesystem.
  • CVE-2021-41091 Lock down file permissions to prevent unprivileged users from discovering and executing programs in /var/lib/docker.

Packaging

  • Update Golang runtime to Go 1.16.8, which contains fixes for CVE-2021-36221 and CVE-2021-39293
  • Update static binaries and containerd.io rpm and deb packages to containerd v1.4.11 and runc v1.0.2 to address CVE-2021-41103.
  • Update the bundled buildx version to v0.6.3 for rpm and deb packages.
Commits

Dependabot compatibility score

You can trigger a rebase of this PR by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [github.com/docker/docker](https://github.com/docker/docker) from 20.10.8+incompatible to 20.10.9+incompatible.
- [Release notes](https://github.com/docker/docker/releases)
- [Changelog](https://github.com/moby/moby/blob/master/CHANGELOG.md)
- [Commits](moby/moby@v20.10.8...v20.10.9)

---
updated-dependencies:
- dependency-name: github.com/docker/docker
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Oct 4, 2021
@dependabot @github
Copy link
Author

dependabot bot commented on behalf of github Oct 25, 2021

Superseded by #5.

@dependabot dependabot bot closed this Oct 25, 2021
@dependabot dependabot bot deleted the dependabot/go_modules/github.com/docker/docker-20.10.9incompatible branch October 25, 2021 20:30
mdelapenya pushed a commit that referenced this pull request Nov 20, 2024
* Respect custom waitStrategy for InfluxDB (#1)

fix(influxdb): Respect passed waitStrategy

* Refactor test to use require for container state assertion

Co-authored-by: Steven Hartland <[email protected]>

* Change default wait strategy from checking logs to health check for influxdb2 (#2)

* /health check waitStrategy for influx1 and influx2

* Undo health endpoint test after default strategy was changed

* Update http health check to verify JSON status value (#3)

* Move Shutdown check to WithInitDb (#4)

Move Shutdown check to WithInitDb

* Remove slice

Co-authored-by: Steven Hartland <[email protected]>

* Simplify comment

Co-authored-by: Steven Hartland <[email protected]>

* More precise WitInitDb domment

---------

Co-authored-by: Steven Hartland <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants