moby/vendor
Sebastiaan van Stijn 7b575f9813 vendor: update golang.org/x/crypto 69ecbb4d6d5dab05e49161c6e77ea40a030884e1
full diff: 88737f569e...69ecbb4d6d

Includes 69ecbb4d6d
(forward-port of 8b5121be2f),
which fixes CVE-2020-7919:

- Panic in crypto/x509 certificate parsing and golang.org/x/crypto/cryptobyte
  On 32-bit architectures, a malformed input to crypto/x509 or the ASN.1 parsing
  functions of golang.org/x/crypto/cryptobyte can lead to a panic.
  The malformed certificate can be delivered via a crypto/tls connection to a
  client, or to a server that accepts client certificates. net/http clients can
  be made to crash by an HTTPS server, while net/http servers that accept client
  certificates will recover the panic and are unaffected.
  Thanks to Project Wycheproof for providing the test cases that led to the
  discovery of this issue. The issue is CVE-2020-7919 and Go issue golang.org/issue/36837.

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
(cherry picked from commit b606c8e440)
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2020-02-04 17:15:19 +00:00
..
cloud.google.com/go Update containerd to 1.1 2018-06-04 15:37:03 -07:00
code.cloudfoundry.org/clock bump docker/swarmkit 59163bf75df38489d4a10392265d27156dc473c5 2019-04-15 18:04:36 +02:00
github.com Merge pull request #429 from thaJeztah/19.03_backport_windows_1903_fixes 2020-01-23 20:48:16 +01:00
go.etcd.io/bbolt Update modules to support riscv64 2019-09-16 18:34:16 +02:00
go.opencensus.io Update containerd to 1.1 2018-06-04 15:37:03 -07:00
golang.org/x vendor: update golang.org/x/crypto 69ecbb4d6d5dab05e49161c6e77ea40a030884e1 2020-02-04 17:15:19 +00:00
google.golang.org bump google.golang.org/grpc v1.23.0 2019-09-12 12:09:48 +02:00
gotest.tools bump vndr to f5ab8fc5f, and revendor 2019-08-08 18:49:07 +02:00