containerd/vendor/golang.org/x
Sebastiaan van Stijn 2002411638
vendor: update golang.org/x/crypto 69ecbb4d6d5dab05e49161c6e77ea40a030884e1
full diff: 60c769a6c5...69ecbb4d6d

Includes 69ecbb4d6d
(forward-port of 8b5121be2f),
to address CVE-2020-7919:

Panic in crypto/x509 certificate parsing and golang.org/x/crypto/cryptobyte
On 32-bit architectures, a malformed input to crypto/x509 or the ASN.1 parsing
functions of golang.org/x/crypto/cryptobyte can lead to a panic.
The malformed certificate can be delivered via a crypto/tls connection to a
client, or to a server that accepts client certificates. net/http clients can
be made to crash by an HTTPS server, while net/http servers that accept client
certificates will recover the panic and are unaffected.
Thanks to Project Wycheproof for providing the test cases that led to the
discovery of this issue. The issue is CVE-2020-7919 and Go issue golang.org/issue/36837.

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2020-01-28 18:46:31 +01:00
..
crypto vendor: update golang.org/x/crypto 69ecbb4d6d5dab05e49161c6e77ea40a030884e1 2020-01-28 18:46:31 +01:00
net Update x/sys, x/net and bbolt modules to support Risc-V 2019-06-07 17:54:32 -03:00
oauth2 Update cri to 4ea022f82a55c449bf15bfc62ac8b0de968d81be. 2019-09-23 17:51:26 -07:00
sync Add image pull concurrency limit. 2019-01-29 10:27:05 -08:00
sys Update golang.org/x/sys to recent commit 2019-11-22 19:34:38 -05:00
text Rerun vndr with newest version 2017-07-12 11:01:45 +01:00
time update dependencies of containerd/cri 2020-01-25 14:20:17 -05:00