Skip to content

[28.x backport] Fix firewalld reload for per-endpoint rules#50506

Merged
robmry merged 2 commits intomoby:28.xfrom
robmry:backport-28.x/fix_firewalld_reload
Jul 25, 2025
Merged

[28.x backport] Fix firewalld reload for per-endpoint rules#50506
robmry merged 2 commits intomoby:28.xfrom
robmry:backport-28.x/fix_firewalld_reload

Conversation

@robmry
Copy link
Contributor

@robmry robmry commented Jul 24, 2025

- What I did

Make sure per-Endpoint rules are reapplied after a firewalld reload.

- How I did it

- How to verify it

- Human readable description for the release notes

- Replace per-endpoint iptables rules after a firewalld reload.

- A picture of a cute animal (not mandatory but encouraged)

robmry and others added 2 commits July 24, 2025 17:30
Make sure iptables rules are restored properly once firewalld
has deleted them.

Signed-off-by: Rob Murray <rob.murray@docker.com>
Signed-off-by: Andrey Epifanov <aepifanov@mirantis.com>
(cherry picked from commit 6d457d9)
Signed-off-by: Rob Murray <rob.murray@docker.com>
Signed-off-by: Andrey Epifanov <aepifanov@mirantis.com>
(cherry picked from commit 0739307)
Signed-off-by: Rob Murray <rob.murray@docker.com>
@robmry robmry force-pushed the backport-28.x/fix_firewalld_reload branch from f2bda67 to 3e9ff78 Compare July 24, 2025 16:36
@robmry robmry marked this pull request as ready for review July 24, 2025 18:16
@robmry robmry requested review from akerouanton and corhere July 24, 2025 18:17
@robmry robmry merged commit bea959c into moby:28.x Jul 25, 2025
246 of 249 checks passed
@robmry robmry deleted the backport-28.x/fix_firewalld_reload branch July 25, 2025 08:14
dnegreira added a commit to dnegreira/advisories that referenced this pull request Sep 2, 2025
Update advisory for GHSA-mh63-6h87-95cp
The dependency causing this CVE, golang-jwt/jwt v3.2.1, is brought in
via the project's main go.mod. Due to functional changes required to
move away from v3 to v4/v5, upstream maintainers are required to do the
necessary changes to the project code in order to fix this
vulnerability.

Update advisory for GHSA-4vq8-7jfc-9cvp
This vulnerability affects Docker Engine (Moby) versions <= 25.0.12
where firewalld reload removes Docker''''s iptables rules that isolate
containers in different bridge networks. Upstream maintainers must cut a
release with the fix. References: 25.x backport PR:
moby/moby#50445 28.x backport PR:
moby/moby#50506'

Update advisory for CVE-2024-36623
This vulnerability is being detected erroneously since this issue has
been fixed since docker 25.0.4 and we currently ship v25.0.8

Signed-off-by: David Negreira <david.negreira@chainguard.dev>
dnegreira added a commit to dnegreira/advisories that referenced this pull request Sep 2, 2025
Update advisory for GHSA-mh63-6h87-95cp
The dependency causing this CVE, golang-jwt/jwt v3.2.1, is brought in
via the project's main go.mod. Due to functional changes required to
move away from v3 to v4/v5, upstream maintainers are required to do the
necessary changes to the project code in order to fix this
vulnerability.

Update advisory for GHSA-4vq8-7jfc-9cvp
This vulnerability affects Docker Engine (Moby) versions <= 25.0.12
where firewalld reload removes Docker''''s iptables rules that isolate
containers in different bridge networks. Upstream maintainers must cut a
release with the fix. References: 25.x backport PR:
moby/moby#50445 28.x backport PR:
moby/moby#50506'

Update advisory for CVE-2024-36623
This vulnerability is being detected erroneously since this issue has
been fixed since docker 25.0.4 and we currently ship v25.0.8
github-merge-queue bot pushed a commit to wolfi-dev/advisories that referenced this pull request Sep 2, 2025
Update advisory for GHSA-mh63-6h87-95cp
The dependency causing this CVE, golang-jwt/jwt v3.2.1, is brought in
via the project's main go.mod. Due to functional changes required to
move away from v3 to v4/v5, upstream maintainers are required to do the
necessary changes to the project code in order to fix this
vulnerability.

Update advisory for GHSA-4vq8-7jfc-9cvp
This vulnerability affects Docker Engine (Moby) versions <= 25.0.12
where firewalld reload removes Docker''''s iptables rules that isolate
containers in different bridge networks. Upstream maintainers must cut a
release with the fix. References: 25.x backport PR:
moby/moby#50445 28.x backport PR:
moby/moby#50506'

Update advisory for CVE-2024-36623
This vulnerability is being detected erroneously since this issue has
been fixed since docker 25.0.4 and we currently ship v25.0.8

Signed-off-by: David Negreira <david.negreira@chainguard.dev>
dnegreira added a commit to dnegreira/advisories that referenced this pull request Sep 2, 2025
Update advisory for GHSA-mh63-6h87-95cp
The dependency causing this CVE, golang-jwt/jwt v3.2.1, is brought in
via the project's main go.mod. Due to functional changes required to
move away from v3 to v4/v5, upstream maintainers are required to do the
necessary changes to the project code in order to fix this
vulnerability.

Update advisory for GHSA-4vq8-7jfc-9cvp
This vulnerability affects Docker Engine (Moby) versions <= 25.0.12
where firewalld reload removes Docker''''s iptables rules that isolate
containers in different bridge networks. Upstream maintainers must cut a
release with the fix. References: 25.x backport PR:
moby/moby#50445 28.x backport PR:
moby/moby#50506'

Update advisory for CVE-2024-36623
This vulnerability is being detected erroneously since this issue has
been fixed since docker 25.0.4 and we currently ship v25.0.8

Signed-off-by: David Negreira <david.negreira@chainguard.dev>
dnegreira added a commit to dnegreira/advisories that referenced this pull request Sep 2, 2025
Update advisory for GHSA-mh63-6h87-95cp
The dependency causing this CVE, golang-jwt/jwt v3.2.1, is brought in
via the project's main go.mod. Due to functional changes required to
move away from v3 to v4/v5, upstream maintainers are required to do the
necessary changes to the project code in order to fix this
vulnerability.

Update advisory for GHSA-4vq8-7jfc-9cvp
This vulnerability affects Docker Engine (Moby) versions <= 25.0.12
where firewalld reload removes Docker''''s iptables rules that isolate
containers in different bridge networks. Upstream maintainers must cut a
release with the fix. References: 25.x backport PR:
moby/moby#50445 28.x backport PR:
moby/moby#50506'

Update advisory for CVE-2024-36623
This vulnerability is being detected erroneously since this issue has
been fixed since docker 25.0.4 and we currently ship v25.0.8
github-merge-queue bot pushed a commit to wolfi-dev/advisories that referenced this pull request Sep 2, 2025
Update advisory for GHSA-mh63-6h87-95cp
The dependency causing this CVE, golang-jwt/jwt v3.2.1, is brought in
via the project's main go.mod. Due to functional changes required to
move away from v3 to v4/v5, upstream maintainers are required to do the
necessary changes to the project code in order to fix this
vulnerability.

Update advisory for GHSA-4vq8-7jfc-9cvp
This vulnerability affects Docker Engine (Moby) versions <= 25.0.12
where firewalld reload removes Docker''''s iptables rules that isolate
containers in different bridge networks. Upstream maintainers must cut a
release with the fix. References: 25.x backport PR:
moby/moby#50445 28.x backport PR:
moby/moby#50506'

Update advisory for CVE-2024-36623
This vulnerability is being detected erroneously since this issue has
been fixed since docker 25.0.4 and we currently ship v25.0.8

Signed-off-by: David Negreira <david.negreira@chainguard.dev>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants