DockerCLI/.github/workflows
Paweł Gronowski 400f12f7a5
update to go1.21.12
- https://github.com/golang/go/issues?q=milestone%3AGo1.21.12+label%3ACherryPickApproved
- full diff: https://github.com/golang/go/compare/go1.21.11...go1.21.12

These minor releases include 1 security fixes following the security policy:

net/http: denial of service due to improper 100-continue handling

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail.

An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

Thanks to Geoff Franks for reporting this issue.

This is CVE-2024-24791 and Go issue https://go.dev/issue/67555.
View the release notes for more information:
https://go.dev/doc/devel/release#go1.21.12

**- Description for the changelog**

```markdown changelog
Update Go runtime to 1.21.12
```

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
(cherry picked from commit d73d7d4ed3)
Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
2024-07-03 12:17:26 +02:00
..
build.yml gha: update to actions/upload-artifact@v4 2024-06-03 16:41:45 +02:00
codeql.yml ci: set DISABLE_WARN_OUTSIDE_CONTAINER=1 for CodeQL action 2024-03-17 14:49:49 +01:00
e2e.yml ci: set codecov token 2024-02-22 18:11:18 +01:00
test.yml update to go1.21.12 2024-07-03 12:17:26 +02:00
validate-pr.yml ci/validate-pr: Use `::error::` command to print errors 2024-04-19 14:02:20 +02:00
validate.yml Update gha runners and engines used in e2e tests 2024-02-13 13:30:09 +00:00