moby/.github/workflows
Cory Snider f9d4589976 Update to Go 1.19.3 to address CVE-2022-41716
On Windows, syscall.StartProcess and os/exec.Cmd did not properly
    check for invalid environment variable values. A malicious
    environment variable value could exploit this behavior to set a
    value for a different environment variable. For example, the
    environment variable string "A=B\x00C=D" set the variables "A=B" and
    "C=D".

    Thanks to RyotaK (https://twitter.com/ryotkak) for reporting this
    issue.

    This is CVE-2022-41716 and Go issue https://go.dev/issue/56284.

This Go release also fixes https://github.com/golang/go/issues/56309, a
runtime bug which can cause random memory corruption when a goroutine
exits with runtime.LockOSThread() set. This fix is necessary to unblock
work to replace certain uses of pkg/reexec with unshared OS threads.

Signed-off-by: Cory Snider <csnider@mirantis.com>
2022-11-01 16:54:48 -04:00
..
.dco.yml ci: reusable dco workflow 2022-09-10 15:10:51 +02:00
.windows.yml Update to Go 1.19.3 to address CVE-2022-41716 2022-11-01 16:54:48 -04:00
buildkit.yml Merge pull request #44337 from thaJeztah/buildkit_skip_unit 2022-10-21 01:59:41 +02:00
ci.yml ci: reduce cache throttling limits 2022-09-21 22:41:45 +02:00
test.yml Update to Go 1.19.3 to address CVE-2022-41716 2022-11-01 16:54:48 -04:00
windows-2019.yml ci: reusable dco workflow 2022-09-10 15:10:51 +02:00
windows-2022.yml ci: fix branch filter pattern 2022-09-20 21:17:29 +02:00