diff options
author | Lokesh Mandvekar <lsm5@fedoraproject.org> | 2022-04-12 09:29:36 -0400 |
---|---|---|
committer | Lokesh Mandvekar <lsm5@fedoraproject.org> | 2022-04-12 10:24:32 -0400 |
commit | 5e680d54e9e8b849b90047d2d87bc7664edaaa1d (patch) | |
tree | 4f9b314d7211bd04d030f6aa6563ddd8628a60b8 /vendor/golang.org/x/crypto/chacha20 | |
parent | 9822c46981226c3296b5ad7833d8937cfc3ece49 (diff) | |
download | podman-5e680d54e9e8b849b90047d2d87bc7664edaaa1d.tar.gz podman-5e680d54e9e8b849b90047d2d87bc7664edaaa1d.tar.bz2 podman-5e680d54e9e8b849b90047d2d87bc7664edaaa1d.zip |
Bump golang.org/x/crypto to 7b82a4e
Resolves: GHSA-8c26-wmh5-6g9v - CVE-2022-27191
Podman doesn't seem to be directly affected as the logic in question
is not called.
golang.org/x/crypto@1baeb1ce contains the actual CVE fix. Using the
latest upstream commit to also include support for SHA-2.
Signed-off-by: Lokesh Mandvekar <lsm5@fedoraproject.org>
Diffstat (limited to 'vendor/golang.org/x/crypto/chacha20')
-rw-r--r-- | vendor/golang.org/x/crypto/chacha20/chacha_s390x.go | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/vendor/golang.org/x/crypto/chacha20/chacha_s390x.go b/vendor/golang.org/x/crypto/chacha20/chacha_s390x.go index c5898db46..4652247b8 100644 --- a/vendor/golang.org/x/crypto/chacha20/chacha_s390x.go +++ b/vendor/golang.org/x/crypto/chacha20/chacha_s390x.go @@ -15,6 +15,7 @@ const bufSize = 256 // xorKeyStreamVX is an assembly implementation of XORKeyStream. It must only // be called when the vector facility is available. Implementation in asm_s390x.s. +// //go:noescape func xorKeyStreamVX(dst, src []byte, key *[8]uint32, nonce *[3]uint32, counter *uint32) |