Skip to content

[release-4.12] OCPBUGS-46236: CVE-2024-45337, CVE-2025-22869 Update golang.org/x/crypto to patched OpenShift fork#129

Closed
aman4433 wants to merge 1 commit intoopenshift:release-4.12from
aman4433:bump-go-crypto-release-4.12
Closed

[release-4.12] OCPBUGS-46236: CVE-2024-45337, CVE-2025-22869 Update golang.org/x/crypto to patched OpenShift fork#129
aman4433 wants to merge 1 commit intoopenshift:release-4.12from
aman4433:bump-go-crypto-release-4.12

Conversation

@aman4433
Copy link
Copy Markdown
Contributor

To address GHSA-v778-237x-gjrc, update golang.org/x/crypto/ssh to version v0.31.0 or later. This fixes an authorization bypass in ServerConfig.PublicKeyCallback that could allow unauthorized SSH access. Users should apply the update and rebuild affected applications immediately.

We are using the OpenShift fork of golang.org/x/crypto (tagged v0.35.0-openshift) to avoid introducing an implicit Go version upgrade, which the upstream v0.35.0 module enforces.

…-4.19

[release-4.19] OCPBUGS-52542: CVE-2025-22869 Update golang.org/x/crypto to patched OpenShift fork
@openshift-ci-robot openshift-ci-robot added jira/severity-important Referenced Jira bug's severity is important for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. jira/invalid-bug Indicates that a referenced Jira bug is invalid for the branch this PR is targeting. labels Sep 10, 2025
@openshift-ci-robot
Copy link
Copy Markdown

@aman4433: This pull request references Jira Issue OCPBUGS-46236, which is invalid:

  • expected dependent Jira Issue OCPBUGS-46235 to be in one of the following states: VERIFIED, RELEASE PENDING, CLOSED (ERRATA), CLOSED (CURRENT RELEASE), CLOSED (DONE), CLOSED (DONE-ERRATA), but it is POST instead

Comment /jira refresh to re-evaluate validity if changes to the Jira bug are made, or edit the title of this pull request to link to a different bug.

The bug has been updated to refer to the pull request using the external bug tracker.

Details

In response to this:

To address GHSA-v778-237x-gjrc, update golang.org/x/crypto/ssh to version v0.31.0 or later. This fixes an authorization bypass in ServerConfig.PublicKeyCallback that could allow unauthorized SSH access. Users should apply the update and rebuild affected applications immediately.

We are using the OpenShift fork of golang.org/x/crypto (tagged v0.35.0-openshift) to avoid introducing an implicit Go version upgrade, which the upstream v0.35.0 module enforces.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@aman4433 aman4433 changed the title [release-4.13] OCPBUGS-46236: CVE-2024-45337, CVE-2025-22869 Update golang.org/x/crypto to patched OpenShift fork [release-4.12] OCPBUGS-46236: CVE-2024-45337, CVE-2025-22869 Update golang.org/x/crypto to patched OpenShift fork Sep 10, 2025
@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented Sep 10, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign mkumatag for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented Sep 10, 2025

@aman4433: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@openshift-bot
Copy link
Copy Markdown

Issues go stale after 90d of inactivity.

Mark the issue as fresh by commenting /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.
Exclude this issue from closing by commenting /lifecycle frozen.

If this issue is safe to close now please do so with /close.

/lifecycle stale

@openshift-ci openshift-ci Bot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Dec 10, 2025
@openshift-bot
Copy link
Copy Markdown

Stale issues rot after 30d of inactivity.

Mark the issue as fresh by commenting /remove-lifecycle rotten.
Rotten issues close after an additional 30d of inactivity.
Exclude this issue from closing by commenting /lifecycle frozen.

If this issue is safe to close now please do so with /close.

/lifecycle rotten
/remove-lifecycle stale

@openshift-ci openshift-ci Bot added lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. and removed lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. labels Jan 9, 2026
@openshift-bot
Copy link
Copy Markdown

Rotten issues close after 30d of inactivity.

Reopen the issue by commenting /reopen.
Mark the issue as fresh by commenting /remove-lifecycle rotten.
Exclude this issue from closing again by commenting /lifecycle frozen.

/close

@openshift-ci openshift-ci Bot closed this Feb 9, 2026
@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented Feb 9, 2026

@openshift-bot: Closed this PR.

Details

In response to this:

Rotten issues close after 30d of inactivity.

Reopen the issue by commenting /reopen.
Mark the issue as fresh by commenting /remove-lifecycle rotten.
Exclude this issue from closing again by commenting /lifecycle frozen.

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@openshift-ci-robot
Copy link
Copy Markdown

@aman4433: This pull request references Jira Issue OCPBUGS-46236. The bug has been updated to no longer refer to the pull request using the external bug tracker. All external bug links have been closed. The bug has been moved to the NEW state.

Details

In response to this:

To address GHSA-v778-237x-gjrc, update golang.org/x/crypto/ssh to version v0.31.0 or later. This fixes an authorization bypass in ServerConfig.PublicKeyCallback that could allow unauthorized SSH access. Users should apply the update and rebuild affected applications immediately.

We are using the OpenShift fork of golang.org/x/crypto (tagged v0.35.0-openshift) to avoid introducing an implicit Go version upgrade, which the upstream v0.35.0 module enforces.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

jira/invalid-bug Indicates that a referenced Jira bug is invalid for the branch this PR is targeting. jira/severity-important Referenced Jira bug's severity is important for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants