From 5e680d54e9e8b849b90047d2d87bc7664edaaa1d Mon Sep 17 00:00:00 2001 From: Lokesh Mandvekar Date: Tue, 12 Apr 2022 09:29:36 -0400 Subject: Bump golang.org/x/crypto to 7b82a4e Resolves: GHSA-8c26-wmh5-6g9v - CVE-2022-27191 Podman doesn't seem to be directly affected as the logic in question is not called. golang.org/x/crypto@1baeb1ce contains the actual CVE fix. Using the latest upstream commit to also include support for SHA-2. Signed-off-by: Lokesh Mandvekar --- vendor/golang.org/x/crypto/ssh/cipher.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'vendor/golang.org/x/crypto/ssh/cipher.go') diff --git a/vendor/golang.org/x/crypto/ssh/cipher.go b/vendor/golang.org/x/crypto/ssh/cipher.go index f8bdf4984..770e8a663 100644 --- a/vendor/golang.org/x/crypto/ssh/cipher.go +++ b/vendor/golang.org/x/crypto/ssh/cipher.go @@ -640,7 +640,7 @@ const chacha20Poly1305ID = "chacha20-poly1305@openssh.com" // chacha20Poly1305Cipher implements the chacha20-poly1305@openssh.com // AEAD, which is described here: // -// https://tools.ietf.org/html/draft-josefsson-ssh-chacha20-poly1305-openssh-00 +// https://tools.ietf.org/html/draft-josefsson-ssh-chacha20-poly1305-openssh-00 // // the methods here also implement padding, which RFC4253 Section 6 // also requires of stream ciphers. -- cgit v1.2.3-54-g00ecf