Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade golang.org/x/crypto to version 0.0.0-20200220183623-bac4c82f6975 or higher. #451

Closed
IzhakJakov opened this issue Feb 10, 2022 · 8 comments · Fixed by #503 or newrelic/docs-website#7786
Labels
bug good first issue Quality & UX Code Quality and User Experience

Comments

@IzhakJakov
Copy link

Description

golang.org/x/crypto is a SSH client and server

Affected versions of this package are vulnerable to Improper Signature Verification. An attacker can craft an ssh-ed25519 or sk-ssh-...@openssh.com public key, such that the library will panic when trying to verify a signature with it. Clients can deliver such a public key and signature to any golang.org/x/crypto/ssh server with a PublicKeyCallback, and servers can deliver them to any golang.org/x/crypto/ssh client

Reference: https://security.snyk.io/vuln/SNYK-GOLANG-GOLANGORGXCRYPTO-1083910

Steps to Reproduce

〉git clone 'https://github.com/newrelic/go-agent'

〉cd go-agent/v3

〉ggdh 'golang.org/x/crypto@v0.0.0-20190308221718-c2843e01d9a2'
             github.com/newrelic/go-agent/v3
                            ⬇
              google.golang.org/grpc@v1.27.0
                            ⬇
   golang.org/x/net@v0.0.0-20190311183353-d8887717615a
                            ⬇
  golang.org/x/crypto@v0.0.0-20190308221718-c2843e01d9a2

Expected Behavior

〉git clone 'https://github.com/newrelic/go-agent'

〉cd go-agent/v3

〉ggdh 'golang.org/x/crypto@v0.0.0-20190308221718-c2843e01d9a2'
"golang.org/x/crypto@v0.0.0-20190308221718-c2843e01d9a2" is not a dependency of this package.
@IzhakJakov IzhakJakov added the bug label Feb 10, 2022
@RichVanderwal RichVanderwal added this to Awaiting User Input in Go Engineering Board via automation Feb 11, 2022
@RichVanderwal RichVanderwal moved this from Awaiting User Input to Triage in Go Engineering Board Feb 11, 2022
@RichVanderwal
Copy link
Contributor

Thanks for submitting this issue, @IzhakJakov ! Thanks to your write-up its clear that this has something to do with the version of our gRPC dependency. We'll put this into our planning process.

@IzhakJakov
Copy link
Author

Thank you.

@Ak-x Ak-x moved this from Triage to To Do in Go Engineering Board Feb 15, 2022
@IzhakJakov
Copy link
Author

What is the expected completion date for this issue?

@iamemilio
Copy link
Contributor

iamemilio commented May 17, 2022

Thanks for following up, we are short staffed right now, so this fell off the radar. I don't think its going to make this upcoming release, but it will definitely make the next one.

@iamemilio
Copy link
Contributor

iamemilio commented May 17, 2022

We will try to get this out ASAP in a micro release

@IzhakJakov
Copy link
Author

Sounds good. Thank you!

@iamemilio iamemilio added good first issue Quality & UX Code Quality and User Experience labels May 23, 2022
@nr-swilloughby nr-swilloughby moved this from To Do to In progress in Go Engineering Board May 26, 2022
@nr-swilloughby
Copy link
Contributor

It seems this comes from the older version of grpc we have in our go.mod files. Moving grpc up to v1.39.0 updates the indirect dependency on x/net and x/crypto such that it depends on x/crypto v0.0.0-20200622213623-75b288015ac9.

@IzhakJakov
Copy link
Author

Thanks for taking care of this :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug good first issue Quality & UX Code Quality and User Experience
Development

Successfully merging a pull request may close this issue.

4 participants