The Docker CLI
Go to file
Sebastiaan van Stijn 485f1f79c5
Update to go 1.19.2 to address CVE-2022-2879, CVE-2022-2880, CVE-2022-41715
From the mailing list:

We have just released Go versions 1.19.2 and 1.18.7, minor point releases.

These minor releases include 3 security fixes following the security policy:

- archive/tar: unbounded memory consumption when reading headers

  Reader.Read did not set a limit on the maximum size of file headers.
  A maliciously crafted archive could cause Read to allocate unbounded
  amounts of memory, potentially causing resource exhaustion or panics.
  Reader.Read now limits the maximum size of header blocks to 1 MiB.

  Thanks to Adam Korczynski (ADA Logics) and OSS-Fuzz for reporting this issue.

  This is CVE-2022-2879 and Go issue https://go.dev/issue/54853.

- net/http/httputil: ReverseProxy should not forward unparseable query parameters

  Requests forwarded by ReverseProxy included the raw query parameters from the
  inbound request, including unparseable parameters rejected by net/http. This
  could permit query parameter smuggling when a Go proxy forwards a parameter
  with an unparseable value.

  ReverseProxy will now sanitize the query parameters in the forwarded query
  when the outbound request's Form field is set after the ReverseProxy.Director
  function returns, indicating that the proxy has parsed the query parameters.
  Proxies which do not parse query parameters continue to forward the original
  query parameters unchanged.

  Thanks to Gal Goldstein (Security Researcher, Oxeye) and
  Daniel Abeles (Head of Research, Oxeye) for reporting this issue.

  This is CVE-2022-2880 and Go issue https://go.dev/issue/54663.

- regexp/syntax: limit memory used by parsing regexps

  The parsed regexp representation is linear in the size of the input,
  but in some cases the constant factor can be as high as 40,000,
  making relatively small regexps consume much larger amounts of memory.

  Each regexp being parsed is now limited to a 256 MB memory footprint.
  Regular expressions whose representation would use more space than that
  are now rejected. Normal use of regular expressions is unaffected.

  Thanks to Adam Korczynski (ADA Logics) and OSS-Fuzz for reporting this issue.

  This is CVE-2022-41715 and Go issue https://go.dev/issue/55949.

View the release notes for more information: https://go.dev/doc/devel/release#go1.19.2

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2022-10-04 20:51:47 +02:00
.circleci dummy circleci config 2022-02-25 21:15:39 +01:00
.github Update to go 1.19.2 to address CVE-2022-2879, CVE-2022-2880, CVE-2022-41715 2022-10-04 20:51:47 +02:00
cli format code with gofumpt 2022-09-30 11:59:11 +02:00
cli-plugins format code with gofumpt 2022-09-30 11:59:11 +02:00
cmd/docker format code with gofumpt 2022-09-30 11:59:11 +02:00
contrib/completion completion: remove options related to deprecated cluster-store 2022-05-17 11:03:25 +02:00
dockerfiles Update to go 1.19.2 to address CVE-2022-2879, CVE-2022-2880, CVE-2022-41715 2022-10-04 20:51:47 +02:00
docs linting: ST1005: error strings should not be capitalized (stylecheck) 2022-09-03 21:25:42 +02:00
e2e format code with gofumpt 2022-09-30 11:59:11 +02:00
experimental experimental: fix broken link to "checkpoint and restore" page 2021-09-07 13:30:48 +02:00
internal/test format code with gofumpt 2022-09-30 11:59:11 +02:00
man docs: remove documentation about deprecated cluster-store 2022-05-17 11:00:51 +02:00
opts format code with gofumpt 2022-09-30 11:59:11 +02:00
scripts update to golang 1.19 2022-09-08 10:40:06 +02:00
service/logs bump gotest.tools v3.0.1 for compatibility with Go 1.14 2020-02-23 00:28:55 +01:00
templates staticcheck: ignore SA1019: strings.Title is deprecated 2022-03-28 17:23:06 +02:00
vendor Merge pull request #3760 from thaJeztah/update_credshelpers 2022-09-22 19:07:00 +02:00
.dockerignore validate manpages target 2022-02-25 17:11:17 +01:00
.gitattributes fix linguist with .gitattributes 2021-12-16 21:16:02 +01:00
.gitignore validate manpages target 2022-02-25 17:11:17 +01:00
.golangci.yml golangci-lint: update to v1.49.0 for compatibilty with go1.19 2022-09-03 21:25:47 +02:00
.mailmap update AUTHORS and mailmap 2022-06-03 12:18:51 +02:00
AUTHORS update AUTHORS and mailmap 2022-06-03 12:18:51 +02:00
CONTRIBUTING.md Fix broken link in CONTRIBUTING 2020-03-19 15:03:59 +01:00
Dockerfile Update to go 1.19.2 to address CVE-2022-2879, CVE-2022-2880, CVE-2022-41715 2022-10-04 20:51:47 +02:00
LICENSE Add project files 2017-04-17 17:49:33 -04:00
MAINTAINERS maintainers: Add Paweł Gronowski as curator 2022-07-07 14:03:25 +02:00
Makefile Makefile: don't warn "outside container" for some targets 2022-04-06 19:10:53 +02:00
NOTICE switch kr/pty to creack/pty v1.1.7 2019-07-29 16:45:41 -07:00
README.md remove circleci 2022-02-25 17:11:17 +01:00
TESTING.md tweak description of login/logout 2022-04-04 10:44:11 +02:00
VERSION Update version to 22.06.0-dev 2022-05-17 11:41:40 +02:00
codecov.yml Drop support for (archived) Compose-on-Kubernetes 2022-02-22 13:47:34 +01:00
docker-bake.hcl Update to go 1.19.2 to address CVE-2022-2879, CVE-2022-2880, CVE-2022-41715 2022-10-04 20:51:47 +02:00
docker.Makefile Makefile: add missing help messages for some targets 2022-04-06 18:34:51 +02:00
vendor.mod Merge pull request #3760 from thaJeztah/update_credshelpers 2022-09-22 19:07:00 +02:00
vendor.sum Merge pull request #3760 from thaJeztah/update_credshelpers 2022-09-22 19:07:00 +02:00

README.md

Docker CLI

PkgGoDev Build Status Test Status Go Report Card Codecov

About

This repository is the home of the cli used in the Docker CE and Docker EE products.

Development

docker/cli is developed using Docker.

Build CLI from source:

docker buildx bake

Build binaries for all supported platforms:

docker buildx bake cross

Build for a specific platform:

docker buildx bake --set binary.platform=linux/arm64 

Build dynamic binary for glibc or musl:

USE_GLIBC=1 docker buildx bake dynbinary 

Run all linting:

docker buildx bake lint shellcheck

Run test:

docker buildx bake test

List all the available targets:

make help

In-container development environment

Start an interactive development environment:

make -f docker.Makefile shell

Brought to you courtesy of our legal counsel. For more context, please see the NOTICE document in this repo.

Use and transfer of Docker may be subject to certain restrictions by the United States and other governments.

It is your responsibility to ensure that your use and/or transfer does not violate applicable laws.

For more information, please see https://www.bis.doc.gov

Licensing

docker/cli is licensed under the Apache License, Version 2.0. See LICENSE for the full license text.