chore(deps): update module golang.org/x/crypto to v0.45.0 [security]#418
chore(deps): update module golang.org/x/crypto to v0.45.0 [security]#418renovate-sh-app[bot] wants to merge 1 commit intomainfrom
Conversation
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
7283659 to
a203cec
Compare
4717f0e to
0d93833
Compare
ea41ca7 to
da20cf6
Compare
da20cf6 to
1fbba9e
Compare
ℹ️ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
1fbba9e to
d984543
Compare
4f6c2da to
3a411ef
Compare
8f1b271 to
30a86ac
Compare
8f92df9 to
befd123
Compare
d0698ce to
5f2fd2c
Compare
f483a83 to
4ed4f89
Compare
45e3e33 to
8900c77
Compare
| golang.org/x/sys v0.38.0 // indirect | ||
| golang.org/x/text v0.31.0 // indirect | ||
| golang.org/x/tools v0.38.0 // indirect | ||
| golang.org/x/tools/godoc v0.1.0-deprecated // indirect |
There was a problem hiding this comment.
Deprecated godoc module added indirectly
Medium Severity
The update introduces a new indirect dependency on golang.org/x/tools/godoc v0.1.0-deprecated. Pulling a deprecated module into the build graph can cause unexpected module resolution or policy/CI failures (e.g., dependency allow/deny lists) and can be surprising since it’s not part of normal runtime deps.
Additional Locations (1)
There was a problem hiding this comment.
Bugbot Autofix determined this is a false positive.
The deprecated godoc module is genuinely required because github.com/shurcooL/httpfs/filter tests import golang.org/x/tools/godoc/vfs packages, and excluding it breaks go mod tidy.
| datasource | package | from | to | | ---------- | ------------------- | ------- | ------- | | go | golang.org/x/crypto | v0.42.0 | v0.45.0 | Signed-off-by: renovate-sh-app[bot] <219655108+renovate-sh-app[bot]@users.noreply.github.com>
8900c77 to
875d4cc
Compare


This PR contains the following updates:
v0.42.0→v0.45.0GitHub Vulnerability Alerts
CVE-2025-58181
SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.
CVE-2025-47914
SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.
Potential denial of service in golang.org/x/crypto/ssh/agent
CVE-2025-47913 / GO-2025-4116
More information
Details
SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
golang.org/x/crypto/ssh/agent vulnerable to panic if message is malformed due to out of bounds read
CVE-2025-47914 / GHSA-f6x5-jh6r-wrfv / GO-2025-4135
More information
Details
SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LReferences
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Unbounded memory consumption in golang.org/x/crypto/ssh
CVE-2025-58181 / GHSA-j5w8-q4qc-rx2x / GO-2025-4134
More information
Details
SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
golang.org/x/crypto/ssh allows an attacker to cause unbounded memory consumption
CVE-2025-58181 / GHSA-j5w8-q4qc-rx2x / GO-2025-4134
More information
Details
SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LReferences
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Malformed constraint may cause denial of service in golang.org/x/crypto/ssh/agent
CVE-2025-47914 / GHSA-f6x5-jh6r-wrfv / GO-2025-4135
More information
Details
SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
Need help?
You can ask for more help in the following Slack channel: #proj-renovate-self-hosted. In that channel you can also find ADR and FAQ docs in the Resources section.
Note
Low Risk
Dependency-only updates; main risk is compatibility/regressions from newer
golang.org/x/*transitive versions, but no application logic changes.Overview
Updates Go module dependencies to pull in security fixes by bumping
golang.org/x/cryptotov0.45.0and refreshing relatedgolang.org/x/*modules (x/net,x/sync,x/mod,x/sys,x/text,x/tools).Regenerates
go.sumaccordingly and introduces an additional indirect dependency ongolang.org/x/tools/godoc(deprecated) as part of the updatedx/toolsgraph.Written by Cursor Bugbot for commit 875d4cc. This will update automatically on new commits. Configure here.