Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Conversation

@robmry
Copy link
Contributor

@robmry robmry commented Jul 24, 2025

- What I did

Make sure per-Endpoint rules are reapplied after a firewalld reload.

- How I did it

- How to verify it

- Human readable description for the release notes

- Replace per-endpoint iptables rules after a firewalld reload.

- A picture of a cute animal (not mandatory but encouraged)

robmry and others added 2 commits July 24, 2025 17:30
Make sure iptables rules are restored properly once firewalld
has deleted them.

Signed-off-by: Rob Murray <[email protected]>
Signed-off-by: Andrey Epifanov <[email protected]>
(cherry picked from commit 6d457d9)
Signed-off-by: Rob Murray <[email protected]>
Signed-off-by: Andrey Epifanov <[email protected]>
(cherry picked from commit 0739307)
Signed-off-by: Rob Murray <[email protected]>
@robmry robmry force-pushed the backport-28.x/fix_firewalld_reload branch from f2bda67 to 3e9ff78 Compare July 24, 2025 16:36
@robmry robmry marked this pull request as ready for review July 24, 2025 18:16
@robmry robmry requested review from akerouanton and corhere July 24, 2025 18:17
@robmry robmry merged commit bea959c into moby:28.x Jul 25, 2025
246 of 249 checks passed
@robmry robmry deleted the backport-28.x/fix_firewalld_reload branch July 25, 2025 08:14
dnegreira added a commit to dnegreira/advisories that referenced this pull request Sep 2, 2025
Update advisory for GHSA-mh63-6h87-95cp
The dependency causing this CVE, golang-jwt/jwt v3.2.1, is brought in
via the project's main go.mod. Due to functional changes required to
move away from v3 to v4/v5, upstream maintainers are required to do the
necessary changes to the project code in order to fix this
vulnerability.

Update advisory for GHSA-4vq8-7jfc-9cvp
This vulnerability affects Docker Engine (Moby) versions <= 25.0.12
where firewalld reload removes Docker''''s iptables rules that isolate
containers in different bridge networks. Upstream maintainers must cut a
release with the fix. References: 25.x backport PR:
moby/moby#50445 28.x backport PR:
moby/moby#50506'

Update advisory for CVE-2024-36623
This vulnerability is being detected erroneously since this issue has
been fixed since docker 25.0.4 and we currently ship v25.0.8

Signed-off-by: David Negreira <[email protected]>
dnegreira added a commit to dnegreira/advisories that referenced this pull request Sep 2, 2025
Update advisory for GHSA-mh63-6h87-95cp
The dependency causing this CVE, golang-jwt/jwt v3.2.1, is brought in
via the project's main go.mod. Due to functional changes required to
move away from v3 to v4/v5, upstream maintainers are required to do the
necessary changes to the project code in order to fix this
vulnerability.

Update advisory for GHSA-4vq8-7jfc-9cvp
This vulnerability affects Docker Engine (Moby) versions <= 25.0.12
where firewalld reload removes Docker''''s iptables rules that isolate
containers in different bridge networks. Upstream maintainers must cut a
release with the fix. References: 25.x backport PR:
moby/moby#50445 28.x backport PR:
moby/moby#50506'

Update advisory for CVE-2024-36623
This vulnerability is being detected erroneously since this issue has
been fixed since docker 25.0.4 and we currently ship v25.0.8
github-merge-queue bot pushed a commit to wolfi-dev/advisories that referenced this pull request Sep 2, 2025
Update advisory for GHSA-mh63-6h87-95cp
The dependency causing this CVE, golang-jwt/jwt v3.2.1, is brought in
via the project's main go.mod. Due to functional changes required to
move away from v3 to v4/v5, upstream maintainers are required to do the
necessary changes to the project code in order to fix this
vulnerability.

Update advisory for GHSA-4vq8-7jfc-9cvp
This vulnerability affects Docker Engine (Moby) versions <= 25.0.12
where firewalld reload removes Docker''''s iptables rules that isolate
containers in different bridge networks. Upstream maintainers must cut a
release with the fix. References: 25.x backport PR:
moby/moby#50445 28.x backport PR:
moby/moby#50506'

Update advisory for CVE-2024-36623
This vulnerability is being detected erroneously since this issue has
been fixed since docker 25.0.4 and we currently ship v25.0.8

Signed-off-by: David Negreira <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants