Commit Graph

5 Commits

Author SHA1 Message Date
Paul Holzinger 82c6daa21d
vendor: bump to golang.org/x/crypto@v0.36.0
Fixes: CVE-2025-22869
Fixes: https://issues.redhat.com/browse/RHEL-82775
Fixes: https://issues.redhat.com/browse/RHEL-82776
Fixes: https://issues.redhat.com/browse/RHEL-81319
Fixes: https://issues.redhat.com/browse/OCPBUGS-52552
Signed-off-by: Paul Holzinger <pholzing@redhat.com>
2025-03-11 19:17:59 +01:00
Paul Holzinger 8a52e638e6
vendor latest c/common
Includes the default db backend changes.

Signed-off-by: Paul Holzinger <pholzing@redhat.com>
2023-10-10 17:08:04 +02:00
Daniel J Walsh 5df00c6f79
Vendor in latest containers/(common,image,storage)
Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
2022-11-11 14:40:03 -05:00
Lokesh Mandvekar 5e680d54e9
Bump golang.org/x/crypto to 7b82a4e
Resolves: GHSA-8c26-wmh5-6g9v - CVE-2022-27191

Podman doesn't seem to be directly affected as the logic in question
is not called.

golang.org/x/crypto@1baeb1ce contains the actual CVE fix. Using the
latest upstream commit to also include support for SHA-2.

Signed-off-by: Lokesh Mandvekar <lsm5@fedoraproject.org>
2022-04-12 10:24:32 -04:00
Jhon Honce 89678ab0ed Add APIv2 CLI example POC
* Add ReadMe, CLI and unit files to support socket activation, both for
  system and rootless

Signed-off-by: Jhon Honce <jhonce@redhat.com>
2020-01-15 09:13:45 -07:00