-
Notifications
You must be signed in to change notification settings - Fork 487
fix(deps): update module golang.org/x/crypto to v0.45.0 [security] #4837
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
🔍 Dependency ReviewBelow are the assessed dependency updates from go.mod. Each section summarizes potential impact, cites upstream changelogs/commits where available, and calls out any code changes that may be required.
golang.org/x/crypto v0.43.0 -> v0.45.0 — ✅ SafeSummary:
Potential impacts:
Evidence:
Required code changes: None. golang.org/x/net v0.46.0 -> v0.47.0 — ✅ SafeSummary:
Potential impacts:
Evidence:
Required code changes: None. golang.org/x/sync v0.17.0 -> v0.18.0 — ✅ SafeSummary:
Evidence: Required code changes: None. golang.org/x/sys v0.37.0 -> v0.38.0 — ✅ SafeSummary:
Evidence: Required code changes: None. golang.org/x/text v0.30.0 -> v0.31.0 — ✅ SafeSummary:
Potential impacts:
Evidence: Required code changes: None. If golden tests depend on previous Unicode tables, update expected values accordingly. golang.org/x/term v0.36.0 (indirect) -> v0.37.0 (indirect) — ✅ SafeSummary:
Evidence: Required code changes: None. github.com/open-telemetry/opentelemetry-collector-contrib/receiver/awss3receiver indirect -> direct (v0.139.0) — ✅ SafeSummary:
Potential impacts:
Evidence:
Required code changes: None. Notes
|
witekest
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
CVSS Base Score: 7.5
Because of high severity it would be good to include it in 1.12.0 soon.
9e3011e to
534c1f8
Compare
|
Once our OTel update gets merged in, I'll get this one merged as well before cutting the 1.12 RC. |
321b6e9 to
534c1f8
Compare
534c1f8 to
321b6e9
Compare
e9f5032 to
b537c42
Compare
57b754d to
613913f
Compare
b653866 to
83aacef
Compare
0f0bf0c to
151088e
Compare
| datasource | package | from | to | | ---------- | ------------------- | ------- | ------- | | go | golang.org/x/crypto | v0.43.0 | v0.45.0 | Signed-off-by: renovate-sh-app[bot] <219655108+renovate-sh-app[bot]@users.noreply.github.com>
151088e to
7a975d0
Compare
|
Unfortunately we have missed it in 1.12.0. |
This PR contains the following updates:
v0.43.0->v0.45.0GitHub Vulnerability Alerts
CVE-2025-58181
SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.
CVE-2025-47914
SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.
Unbounded memory consumption in golang.org/x/crypto/ssh
CVE-2025-58181 / GHSA-j5w8-q4qc-rx2x / GO-2025-4134
More information
Details
SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Malformed constraint may cause denial of service in golang.org/x/crypto/ssh/agent
CVE-2025-47914 / GHSA-f6x5-jh6r-wrfv / GO-2025-4135
More information
Details
SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
golang.org/x/crypto/ssh allows an attacker to cause unbounded memory consumption
CVE-2025-58181 / GHSA-j5w8-q4qc-rx2x / GO-2025-4134
More information
Details
SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LReferences
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
golang.org/x/crypto/ssh/agent vulnerable to panic if message is malformed due to out of bounds read
CVE-2025-47914 / GHSA-f6x5-jh6r-wrfv / GO-2025-4135
More information
Details
SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LReferences
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
Need help?
You can ask for more help in the following Slack channel: #proj-renovate-self-hosted. In that channel you can also find ADR and FAQ docs in the Resources section.