Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

go.mod: bump x/crypto to v0.31.0 #271

Merged
merged 1 commit into from
Dec 17, 2024
Merged

Conversation

lbajolet-hashicorp
Copy link
Contributor

The crypto experimental module that the SDK depends on was detected vulnerable on v0.23.0 to an authentication bypass attack through the ServerConfig for SSH.

This is only used for locally proxying SSH communications, typically for use with Ansible to provide an SSH server with which to interact, in order to provision an instance of an OS that uses a communicator other than SSH, therefore the vulnerability does not necessarily impact us. However, in order to resolve the automatic report of that vulnerability, we bump the crypto module's version to 0.31.0, where that problem was addressed.

The crypto experimental module that the SDK depends on was detected
vulnerable on v0.23.0 to an authentication bypass attack through the
ServerConfig for SSH.

This is only used for locally proxying SSH communications, typically for
use with Ansible to provide an SSH server with which to interact, in
order to provision an instance of an OS that uses a communicator other
than SSH, therefore the vulnerability does not necessarily impact us.
However, in order to resolve the automatic report of that vulnerability,
we bump the crypto module's version to 0.31.0, where that problem was
addressed.
@lbajolet-hashicorp lbajolet-hashicorp merged commit 25be535 into main Dec 17, 2024
9 checks passed
@lbajolet-hashicorp lbajolet-hashicorp deleted the bump_crypto_module_dep branch December 17, 2024 18:57
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants