This includes 1 security fix:
- net/http: CrossOriginProtection bypass patterns are over-broad
When passing patterns to CrossOriginProtection.AddInsecureBypassPattern,
requests that would have redirected to those patterns (e.g. without a trailing
slash) were also exempted, which might be unexpected.
Thanks to Marco Gazerro for reporting this issue.
This is CVE-2025-47910 and Go issue https://go.dev/issue/75054.
View the release notes for more information:
https://go.dev/doc/devel/release#go1.24.7
Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
21 lines
669 B
Docker
21 lines
669 B
Docker
# syntax=docker/dockerfile:1
|
|
|
|
ARG GO_VERSION=1.24.7
|
|
|
|
FROM golang:${GO_VERSION}-alpine AS generated
|
|
ENV GOTOOLCHAIN=local
|
|
RUN go install github.com/dmcgowan/quicktls@master
|
|
WORKDIR /tmp/gencerts/notary
|
|
RUN --mount=type=bind,source=e2e/testdata/notary,target=/tmp/gencerts/notary,rw <<EOT
|
|
set -eu
|
|
mkdir -p ../notary-evil /out
|
|
quicktls -exp 87600h -org=Docker -with-san notary-server notaryserver evil-notary-server evilnotaryserver localhost 127.0.0.1
|
|
cat ca.pem >> notary-server.cert
|
|
mv ca.pem root-ca.cert
|
|
cp notary-server.cert notary-server.key root-ca.cert ../notary-evil
|
|
cp -r /tmp/gencerts/notary* /out/
|
|
EOT
|
|
|
|
FROM scratch
|
|
COPY --from=generated /out /
|