vendor: golang.org/x/crypto v0.35.0, golang.org/x/oauth2 v0.27.0#49543
Merged
thaJeztah merged 8 commits intomoby:masterfrom Mar 7, 2025
Merged
vendor: golang.org/x/crypto v0.35.0, golang.org/x/oauth2 v0.27.0#49543thaJeztah merged 8 commits intomoby:masterfrom
thaJeztah merged 8 commits intomoby:masterfrom
Conversation
Member
Author
|
More weird errors; perhaps because of the GitHub migration to their "v2" store? |
This was referenced Feb 25, 2025
10fd214 to
61dc1f1
Compare
full diff: golang/sys@v0.29.0...v0.30.0 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
no code-changes, only a godoc comment updated full diff: golang/sync@v0.10.0...v0.11.0 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
no code-changes in vendored files. full diff: golang/text@v0.21.0...v0.22.0 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Relevant changes; - go.mod: update golang.org/x dependencies - ssh: add ServerConfig.PreAuthConnCallback, ServerPreAuthConn (banner) interface full diff: golang/crypto@v0.31.0...v0.33.0 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
No code-changes, but updates the minimum go version to go1.23: > all: upgrade go directive to at least 1.23.0 [generated] > > By now Go 1.24.0 has been released, and Go 1.22 is no longer supported > per the Go Release Policy (https://go.dev/doc/devel/release#policy). > > For golang/go#69095. full diff: golang/crypto@v0.33.0...v0.34.0 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
We have tagged version v0.35.0 of golang.org/x/crypto in order to address a security issue. Version v0.35.0 of golang.org/x/crypto fixes a vulnerability in the golang.org/x/crypto/ssh package which could cause a denial of service. SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted. Thanks to Yuichi Watanabe for reporting this issue. This is CVE-2025-22869 and Go issue https://go.dev/issue/71931. full diff: golang/crypto@v0.31.0...v0.35.0 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
No code changes, only comments (warnings) added; - google: add warning about externally-provided credentials > Important: If you accept a credential configuration (credential JSON/File/Stream) from an > external source for authentication to Google Cloud Platform, you must validate it before > providing it to any Google API or library. Providing an unvalidated credential configuration to > Google APIs can compromise the security of your systems and data. For more information, refer to > [Validate credential configurations from external sources](https://cloud.google.com/docs/authentication/external/externally-sourced-credentials). full diff: golang/oauth2@v0.23.0...v0.26.0 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
We have tagged version v0.27.0 of golang.org/x/oauth2 in order to address a security issue. jws: unexpected memory consumption during token parsing Version v0.27.0 of golang.org/x/oauth2 fixes a vulnerability in the golang.org/x/oauth2/jws package which could cause a denial of service. An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing. Thanks to jub0bs for reporting this issue. This is CVE-2025-22868 and Go issue https://go.dev/issue/71490. full diff: golang/oauth2@v0.26.0...v0.27.0 Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
61dc1f1 to
690f758
Compare
Member
Author
|
Rebased to get a fresh run of CI |
Member
Author
|
🤔 |
vvoland
approved these changes
Mar 7, 2025
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
vendor: golang.org/x/sys v0.30.0
full diff: golang/sys@v0.29.0...v0.30.0
vendor: golang.org/x/sync v0.11.0
no code-changes, only a godoc comment updated
full diff: golang/sync@v0.10.0...v0.11.0
vendor: golang.org/x/text v0.22.0
no code-changes in vendored files.
full diff: golang/text@v0.21.0...v0.22.0
vendor: golang.org/x/crypto v0.33.0
Relevant changes;
interface
full diff: golang/crypto@v0.31.0...v0.33.0
vendor: golang.org/x/crypto v0.34.0
No code-changes, but updates the minimum go version to go1.23:
full diff: golang/crypto@v0.33.0...v0.34.0
vendor: golang.org/x/crypto v0.35.0
We have tagged version v0.35.0 of golang.org/x/crypto in order to address
a security issue. Version v0.35.0 of golang.org/x/crypto fixes a vulnerability
in the golang.org/x/crypto/ssh package which could cause a denial of service.
SSH servers which implement file transfer protocols are vulnerable to a denial
of service attack from clients which complete the key exchange slowly, or not
at all, causing pending content to be read into memory, but never transmitted.
Thanks to Yuichi Watanabe for reporting this issue.
This is CVE-2025-22869 and Go issue https://go.dev/issue/71931.
full diff: golang/crypto@v0.31.0...v0.35.0
vendor: golang.org/x/oauth2 v0.26.0
No code changes, only comments (warnings) added;
full diff: golang/oauth2@v0.23.0...v0.26.0
vendor: golang.org/x/oauth2 v0.27.0
We have tagged version v0.27.0 of golang.org/x/oauth2 in order to address
a security issue.
jws: unexpected memory consumption during token parsing
Version v0.27.0 of golang.org/x/oauth2 fixes a vulnerability in the
golang.org/x/oauth2/jws package which could cause a denial of service.
An attacker can pass a malicious malformed token which causes unexpected
memory to be consumed during parsing.
Thanks to jub0bs for reporting this issue.
This is CVE-2025-22868 and Go issue https://go.dev/issue/71490.
full diff: golang/oauth2@v0.26.0...v0.27.0
- Human readable description for the release notes
- A picture of a cute animal (not mandatory but encouraged)