moby/vendor/golang.org/x
Sebastiaan van Stijn c22fc41ddf
vendor: golang.org/x/crypto v0.17.0
update the package, which contains a fix in the ssh package.

full diff: https://github.com/golang/crypto/compare/v0.16.0...v0.17.0

from the security mailing:

> Hello gophers,
>
> Version v0.17.0 of golang.org/x/crypto fixes a protocol weakness in the
> golang.org/x/crypto/ssh package that allowed a MITM attacker to compromise
> the integrity of the secure channel before it was established, allowing
> them to prevent transmission of a number of messages immediately after
> the secure channel was established without either side being aware.
>
> The impact of this attack is relatively limited, as it does not compromise
> confidentiality of the channel. Notably this attack would allow an attacker
> to prevent the transmission of the SSH2_MSG_EXT_INFO message, disabling a
> handful of newer security features.
>
> This protocol weakness was also fixed in OpenSSH 9.6.
>
> Thanks to Fabian Bäumer, Marcus Brinkmann, and Jörg Schwenk from Ruhr
> University Bochum for reporting this issue.
>
> This is CVE-2023-48795 and Go issue https://go.dev/issue/64784.
>
> Cheers,
> Roland on behalf of the Go team

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2023-12-19 00:30:17 +01:00
..
crypto vendor: golang.org/x/crypto v0.17.0 2023-12-19 00:30:17 +01:00
mod Set BuildKit version using buildinfo 2023-04-25 12:30:52 +02:00
net Bump go-connections for TLS 1.3 support 2023-11-08 17:58:50 +01:00
oauth2 vendor: google.golang.org/grpc v1.58.3 2023-10-27 00:43:19 +02:00
sync vendor: golang.org/x/sys v0.10.0 2023-09-18 18:17:29 +02:00
sys vendor: golang.org/x/sys v0.15.0 2023-12-18 13:37:57 +01:00
text vendor: golang.org/x/text v0.14.0 2023-12-18 13:38:46 +01:00
time libnetwork: replace ad-hoc semaphore implementation 2023-02-16 19:05:59 -05:00
tools vendor: golang.org/x/tools v0.10.0 2023-10-27 00:36:59 +02:00