Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[backport 3.4] Update golang.org/x/crypto to latest #14179

Merged
merged 1 commit into from
Jul 4, 2022

Conversation

lavacat
Copy link

@lavacat lavacat commented Jun 29, 2022

Update crypto to address CVE-2022-27191.

The CVE fix is added in 0.0.0-20220315160706-3147a52a75dd but this
change updates to latest.

Backport of #13996

Please read https://github.com/etcd-io/etcd/blob/main/CONTRIBUTING.md#contribution-flow.

@ahrtr
Copy link
Member

ahrtr commented Jun 29, 2022

Please signoff the commit.

git commit --signoff --amend

@ahrtr
Copy link
Member

ahrtr commented Jun 29, 2022

Part of 14105

@lavacat lavacat force-pushed the release-3.4-crypto branch from 4d6f937 to 1f61ea9 Compare June 29, 2022 08:32
@ahrtr
Copy link
Member

ahrtr commented Jun 30, 2022

@lavacat I just merged a big change for 3.4, and I believe some test failures are resolved. So please rebase this PR, and let's see the new pipeline result.

Update crypto to address CVE-2022-27191.

The CVE fix is added in 0.0.0-20220315160706-3147a52a75dd but this
change updates to latest.

Backport of etcd-io#13996

Signed-off-by: Bogdan Kanivets <[email protected]>
@lavacat lavacat force-pushed the release-3.4-crypto branch from 1f61ea9 to 576a798 Compare July 1, 2022 06:08
Copy link
Member

@ahrtr ahrtr left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Thank you @lavacat

cc @spzala @serathius @ptabor

@serathius serathius merged commit f0256ee into etcd-io:release-3.4 Jul 4, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Development

Successfully merging this pull request may close these issues.

3 participants