Skip to content

fix(deps): vuln unstable: github.com/secure-systems-lab/go-securesystemslib, golang.org/x/crypto · minor: github.com/stretchr/testify #82

Draft
gh-worker-campaigns-3e9aa4[bot] wants to merge 1 commit into
masterfrom
engraver-auto-version-upgrade/unstable/go/1-1776961175
Draft

fix(deps): vuln unstable: github.com/secure-systems-lab/go-securesystemslib, golang.org/x/crypto · minor: github.com/stretchr/testify #82
gh-worker-campaigns-3e9aa4[bot] wants to merge 1 commit into
masterfrom
engraver-auto-version-upgrade/unstable/go/1-1776961175

Conversation

@gh-worker-campaigns-3e9aa4
Copy link
Copy Markdown

Summary: Critical-severity security update — 3 packages upgraded (UNSTABLE changes included)

Manifests changed:

  • . (go)

✅ Action Required: Please review the changes below. If they look good, approve and merge this PR.


Updates

Package From To Type Dep Type Vulnerabilities Fixed
golang.org/x/crypto v0.11.0 v0.50.0 unstable Direct 3 CRITICAL, 2 HIGH, 9 MODERATE, 1 UNKNOWN
github.com/secure-systems-lab/go-securesystemslib v0.7.0 v0.10.0 unstable Direct -
github.com/stretchr/testify v1.8.4 v1.11.1 minor Direct -

Packages marked with "-" are updated due to dependency constraints.


Security Details

🚨 Critical & High Severity (5 fixed)
Package CVE Severity Summary Unsafe Version Fixed In
golang.org/x/crypto GO-2024-3321 critical Misuse of connection.serverAuthenticate may cause authorization bypass in golang.org/x/crypto v0.11.0 0.31.0
golang.org/x/crypto GHSA-v778-237x-gjrc CRITICAL Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto v0.11.0 0.31.0
golang.org/x/crypto CVE-2024-45337 critical - v0.11.0 -
golang.org/x/crypto GHSA-hcg3-q754-cr77 HIGH golang.org/x/crypto Vulnerable to Denial of Service (DoS) via Slow or Incomplete Key Exchange v0.11.0 0.35.0
golang.org/x/crypto GO-2025-3487 HIGH Potential denial of service in golang.org/x/crypto v0.11.0 0.35.0
ℹ️ Other Vulnerabilities (10)
Package CVE Severity Summary Unsafe Version Fixed In
golang.org/x/crypto CVE-2023-48795 MODERATE - v0.11.0 -
golang.org/x/crypto GO-2023-2402 MODERATE Man-in-the-middle attacker can compromise integrity of secure channel in golang.org/x/crypto v0.11.0 0.17.0
golang.org/x/crypto GHSA-j5w8-q4qc-rx2x MODERATE golang.org/x/crypto/ssh allows an attacker to cause unbounded memory consumption v0.11.0 0.45.0
golang.org/x/crypto GHSA-45x7-px36-x8w8 MODERATE Prefix Truncation Attack against ChaCha20-Poly1305 and Encrypt-then-MAC aka Terrapin v0.11.0 0.17.0
golang.org/x/crypto GO-2025-4134 MODERATE Unbounded memory consumption in golang.org/x/crypto/ssh v0.11.0 0.45.0
golang.org/x/crypto CVE-2025-58181 MODERATE - v0.11.0 -
golang.org/x/crypto GHSA-f6x5-jh6r-wrfv MODERATE golang.org/x/crypto/ssh/agent vulnerable to panic if message is malformed due to out of bounds read v0.11.0 0.45.0
golang.org/x/crypto CVE-2025-47914 MODERATE - v0.11.0 -
golang.org/x/crypto GO-2025-4135 MODERATE Malformed constraint may cause denial of service in golang.org/x/crypto/ssh/agent v0.11.0 0.45.0
golang.org/x/crypto GO-2025-4116 unknown Potential denial of service in golang.org/x/crypto/ssh/agent v0.11.0 0.43.0

Review Checklist

Standard review:

  • Review changes for compatibility with your code
  • Check for breaking changes in release notes
  • Run tests locally or wait for CI
  • Approve and merge this PR

Update Mode: Vulnerability Remediation (Critical/High)

🤖 Generated by DataDog Automated Dependency Management System

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants