-
Notifications
You must be signed in to change notification settings - Fork 482
fix(deps): update module golang.org/x/crypto to v0.45.0 [security] #4837
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
fix(deps): update module golang.org/x/crypto to v0.45.0 [security] #4837
Conversation
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
🔍 Dependency ReviewBelow is an analysis of all dependencies whose versions changed in go.mod. For each, I checked the changes between the “from” and “to” versions (inclusive) using upstream release notes, changelogs, and API surfaces. Collapsible sections include references and rationale.
golang.org/x/crypto v0.43.0 -> v0.45.0 — ✅ Safe
Evidence and notes:
golang.org/x/net v0.46.0 -> v0.47.0 — ✅ Safe
Evidence and notes:
golang.org/x/sync v0.17.0 -> v0.18.0 — ✅ Safe
Evidence and notes:
golang.org/x/sys v0.37.0 -> v0.38.0 — ✅ Safe
Evidence and notes:
golang.org/x/text v0.30.0 -> v0.31.0 — ✅ Safe
Evidence and notes:
golang.org/x/term v0.36.0 -> v0.37.0 — ✅ Safe
Evidence and notes:
github.com/open-telemetry/opentelemetry-collector-contrib/receiver/awss3receiver (indirect) -> v0.139.0 (direct) — ✅ Safe
Notes:
Notes
|
witekest
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
CVSS Base Score: 7.5
Because of high severity it would be good to include it in 1.12.0 soon.
9e3011e to
534c1f8
Compare
|
Once our OTel update gets merged in, I'll get this one merged as well before cutting the 1.12 RC. |
321b6e9 to
534c1f8
Compare
534c1f8 to
321b6e9
Compare
e9f5032 to
b537c42
Compare
57b754d to
613913f
Compare
b653866 to
83aacef
Compare
781b7f3 to
0f0bf0c
Compare
| datasource | package | from | to | | ---------- | ------------------- | ------- | ------- | | go | golang.org/x/crypto | v0.43.0 | v0.45.0 | Signed-off-by: renovate-sh-app[bot] <219655108+renovate-sh-app[bot]@users.noreply.github.com>
0f0bf0c to
151088e
Compare
This PR contains the following updates:
v0.43.0->v0.45.0GitHub Vulnerability Alerts
CVE-2025-58181
SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.
CVE-2025-47914
SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.
Malformed constraint may cause denial of service in golang.org/x/crypto/ssh/agent
CVE-2025-47914 / GHSA-f6x5-jh6r-wrfv / GO-2025-4135
More information
Details
SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Unbounded memory consumption in golang.org/x/crypto/ssh
CVE-2025-58181 / GHSA-j5w8-q4qc-rx2x / GO-2025-4134
More information
Details
SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
golang.org/x/crypto/ssh allows an attacker to cause unbounded memory consumption
CVE-2025-58181 / GHSA-j5w8-q4qc-rx2x / GO-2025-4134
More information
Details
SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LReferences
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
golang.org/x/crypto/ssh/agent vulnerable to panic if message is malformed due to out of bounds read
CVE-2025-47914 / GHSA-f6x5-jh6r-wrfv / GO-2025-4135
More information
Details
SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LReferences
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
Need help?
You can ask for more help in the following Slack channel: #proj-renovate-self-hosted. In that channel you can also find ADR and FAQ docs in the Resources section.