fix(deps): update module golang.org/x/crypto to v0.45.0 [security]
This MR contains the following updates:
| Package | Change | Age | Confidence |
|---|---|---|---|
| golang.org/x/crypto |
v0.43.0 -> v0.45.0
|
Malformed constraint may cause denial of service in golang.org/x/crypto/ssh/agent
CVE-2025-47914 / GHSA-f6x5-jh6r-wrfv / GO-2025-4135
More information
Details
SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.
Severity
Unknown
References
- https://groups.google.com/g/golang-announce/c/w-oX3UxNcZA
- https://go.dev/cl/721960
- https://go.dev/issue/76364
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Unbounded memory consumption in golang.org/x/crypto/ssh
CVE-2025-58181 / GHSA-j5w8-q4qc-rx2x / GO-2025-4134
More information
Details
SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.
Severity
Unknown
References
- https://groups.google.com/g/golang-announce/c/w-oX3UxNcZA
- https://go.dev/cl/721961
- https://go.dev/issue/76363
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
golang.org/x/crypto/ssh/agent vulnerable to panic if message is malformed due to out of bounds read
CVE-2025-47914 / GHSA-f6x5-jh6r-wrfv / GO-2025-4135
More information
Details
SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.
Severity
- CVSS Score: 5.3 / 10 (Medium)
- Vector String:
CVSS:3.1/AV:N/AC:L/MR:N/UI:N/S:U/C:N/I:N/A:L
References
- https://nvd.nist.gov/vuln/detail/CVE-2025-47914
- https://go.dev/cl/721960
- https://go.dev/issue/76364
- https://go.googlesource.com/crypto
- https://groups.google.com/g/golang-announce/c/w-oX3UxNcZA
- https://pkg.go.dev/vuln/GO-2025-4135
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
golang.org/x/crypto/ssh allows an attacker to cause unbounded memory consumption
CVE-2025-58181 / GHSA-j5w8-q4qc-rx2x / GO-2025-4134
More information
Details
SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.
Severity
- CVSS Score: 5.3 / 10 (Medium)
- Vector String:
CVSS:3.1/AV:N/AC:L/MR:N/UI:N/S:U/C:N/I:N/A:L
References
- https://nvd.nist.gov/vuln/detail/CVE-2025-58181
- https://go.dev/cl/721961
- https://go.dev/issue/76363
- https://groups.google.com/g/golang-announce/c/w-oX3UxNcZA
- https://pkg.go.dev/vuln/GO-2025-4134
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Configuration
-
If you want to rebase/retry this MR, check this box
This MR has been generated by Renovate Bot.