-
Notifications
You must be signed in to change notification settings - Fork 475
fix(deps): update module golang.org/x/crypto to v0.45.0 [security] #4837
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
fix(deps): update module golang.org/x/crypto to v0.45.0 [security] #4837
Conversation
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
🔍 Dependency ReviewBelow is an assessment of the Go module dependency updates in this PR, with links to release notes and any actionable code-change guidance. golang.org/x/crypto v0.43.0 -> v0.45.0 — ✅ Safe
Summary:
Potential areas to smoke-test:
Code changes required:
golang.org/x/net v0.46.0 -> v0.47.0 — ✅ Safe
Summary:
Potential areas to smoke-test:
Code changes required:
golang.org/x/sync v0.17.0 -> v0.18.0 — ✅ Safe
Summary:
Potential areas to smoke-test:
Code changes required:
golang.org/x/sys v0.37.0 -> v0.38.0 — ✅ Safe
Summary:
Potential areas to smoke-test:
Code changes required:
golang.org/x/text v0.30.0 -> v0.31.0 — ✅ Safe
Summary:
Potential areas to smoke-test:
Code changes required:
golang.org/x/term v0.36.0 -> v0.37.0 (indirect) — ✅ Safe
Summary:
Code changes required:
Notes
|
witekest
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
CVSS Base Score: 7.5
Because of high severity it would be good to include it in 1.12.0 soon.
9e3011e to
534c1f8
Compare
|
Once our OTel update gets merged in, I'll get this one merged as well before cutting the 1.12 RC. |
321b6e9 to
534c1f8
Compare
534c1f8 to
321b6e9
Compare
e9f5032 to
b537c42
Compare
57b754d to
613913f
Compare
7e93563 to
6c499ac
Compare
| datasource | package | from | to | | ---------- | ------------------- | ------- | ------- | | go | golang.org/x/crypto | v0.43.0 | v0.45.0 | Signed-off-by: renovate-sh-app[bot] <219655108+renovate-sh-app[bot]@users.noreply.github.com>
6c499ac to
db253b2
Compare
This PR contains the following updates:
v0.43.0->v0.45.0GitHub Vulnerability Alerts
CVE-2025-58181
SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.
CVE-2025-47914
SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.
golang.org/x/crypto/ssh/agent vulnerable to panic if message is malformed due to out of bounds read
CVE-2025-47914 / GHSA-f6x5-jh6r-wrfv / GO-2025-4135
More information
Details
SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LReferences
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Malformed constraint may cause denial of service in golang.org/x/crypto/ssh/agent
CVE-2025-47914 / GHSA-f6x5-jh6r-wrfv / GO-2025-4135
More information
Details
SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Unbounded memory consumption in golang.org/x/crypto/ssh
CVE-2025-58181 / GHSA-j5w8-q4qc-rx2x / GO-2025-4134
More information
Details
SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
golang.org/x/crypto/ssh allows an attacker to cause unbounded memory consumption
CVE-2025-58181 / GHSA-j5w8-q4qc-rx2x / GO-2025-4134
More information
Details
SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LReferences
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
Need help?
You can ask for more help in the following Slack channel: #proj-renovate-self-hosted. In that channel you can also find ADR and FAQ docs in the Resources section.