DockerCLI/vendor/golang.org/x/crypto/ssh
Sebastiaan van Stijn 27d9aa2d9f
vendor: update golang.org/x/crypto 69ecbb4d6d5dab05e49161c6e77ea40a030884e1 (CVE-2020-7919)
Includes 69ecbb4d6d
(forward-port of 8b5121be2f),
which fixes CVE-2020-7919:

- Panic in crypto/x509 certificate parsing and golang.org/x/crypto/cryptobyte
  On 32-bit architectures, a malformed input to crypto/x509 or the ASN.1 parsing
  functions of golang.org/x/crypto/cryptobyte can lead to a panic.
  The malformed certificate can be delivered via a crypto/tls connection to a
  client, or to a server that accepts client certificates. net/http clients can
  be made to crash by an HTTPS server, while net/http servers that accept client
  certificates will recover the panic and are unaffected.
  Thanks to Project Wycheproof for providing the test cases that led to the
  discovery of this issue. The issue is CVE-2020-7919 and Go issue golang.org/issue/36837.

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2020-01-29 11:25:09 +01:00
..
agent vendor github.com/docker/docker to bcaa613d823 2019-04-03 20:57:18 +00:00
terminal vendor: update golang.org/x/crypto 69ecbb4d6d5dab05e49161c6e77ea40a030884e1 (CVE-2020-7919) 2020-01-29 11:25:09 +01:00
test Bump moby version (and its dependencies) 2018-06-08 11:26:10 +02:00
buffer.go build: add SSH agent socket forwarder (`docker build --ssh $SSHMOUNTID=$SSH_AUTH_SOCK`) 2018-10-05 19:56:32 +09:00
certs.go vendor: update golang.org/x/crypto 69ecbb4d6d5dab05e49161c6e77ea40a030884e1 (CVE-2020-7919) 2020-01-29 11:25:09 +01:00
channel.go build: add SSH agent socket forwarder (`docker build --ssh $SSHMOUNTID=$SSH_AUTH_SOCK`) 2018-10-05 19:56:32 +09:00
cipher.go vendor: update golang.org/x/crypto 69ecbb4d6d5dab05e49161c6e77ea40a030884e1 (CVE-2020-7919) 2020-01-29 11:25:09 +01:00
client.go vendor github.com/docker/docker to bcaa613d823 2019-04-03 20:57:18 +00:00
client_auth.go vendor: update golang.org/x/crypto 69ecbb4d6d5dab05e49161c6e77ea40a030884e1 (CVE-2020-7919) 2020-01-29 11:25:09 +01:00
common.go vendor: update golang.org/x/crypto 69ecbb4d6d5dab05e49161c6e77ea40a030884e1 (CVE-2020-7919) 2020-01-29 11:25:09 +01:00
connection.go build: add SSH agent socket forwarder (`docker build --ssh $SSHMOUNTID=$SSH_AUTH_SOCK`) 2018-10-05 19:56:32 +09:00
doc.go build: add SSH agent socket forwarder (`docker build --ssh $SSHMOUNTID=$SSH_AUTH_SOCK`) 2018-10-05 19:56:32 +09:00
handshake.go vendor: update golang.org/x/crypto 69ecbb4d6d5dab05e49161c6e77ea40a030884e1 (CVE-2020-7919) 2020-01-29 11:25:09 +01:00
kex.go vendor: update golang.org/x/crypto 69ecbb4d6d5dab05e49161c6e77ea40a030884e1 (CVE-2020-7919) 2020-01-29 11:25:09 +01:00
keys.go vendor: update golang.org/x/crypto 69ecbb4d6d5dab05e49161c6e77ea40a030884e1 (CVE-2020-7919) 2020-01-29 11:25:09 +01:00
mac.go build: add SSH agent socket forwarder (`docker build --ssh $SSHMOUNTID=$SSH_AUTH_SOCK`) 2018-10-05 19:56:32 +09:00
messages.go vendor: update golang.org/x/crypto 69ecbb4d6d5dab05e49161c6e77ea40a030884e1 (CVE-2020-7919) 2020-01-29 11:25:09 +01:00
mux.go build: add SSH agent socket forwarder (`docker build --ssh $SSHMOUNTID=$SSH_AUTH_SOCK`) 2018-10-05 19:56:32 +09:00
server.go vendor: update golang.org/x/crypto 69ecbb4d6d5dab05e49161c6e77ea40a030884e1 (CVE-2020-7919) 2020-01-29 11:25:09 +01:00
session.go build: add SSH agent socket forwarder (`docker build --ssh $SSHMOUNTID=$SSH_AUTH_SOCK`) 2018-10-05 19:56:32 +09:00
ssh_gss.go vendor: update golang.org/x/crypto 69ecbb4d6d5dab05e49161c6e77ea40a030884e1 (CVE-2020-7919) 2020-01-29 11:25:09 +01:00
streamlocal.go build: add SSH agent socket forwarder (`docker build --ssh $SSHMOUNTID=$SSH_AUTH_SOCK`) 2018-10-05 19:56:32 +09:00
tcpip.go build: add SSH agent socket forwarder (`docker build --ssh $SSHMOUNTID=$SSH_AUTH_SOCK`) 2018-10-05 19:56:32 +09:00
transport.go bump golang.org/x/crypto 88737f569e3a9c7ab309cdc09a07fe7fc87233c3 2019-05-13 21:49:19 -07:00