Skip to content

Conversation

@campaigner-prod
Copy link

Summary: Critical-severity security update — 1 package upgraded (MINOR changes included)

Manifests changed:

  • . (go)

Updates

Package From To Type Vulnerabilities Fixed
golang.org/x/crypto v0.11.0 v0.46.0 minor 1 CRITICAL, 1 HIGH, 3 MODERATE, 6 UNKNOWN

Security Details

🚨 Critical & High Severity (2 fixed)
Package CVE Severity Summary Unsafe Version Fixed In
golang.org/x/crypto GHSA-v778-237x-gjrc CRITICAL Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto v0.11.0 0.31.0
golang.org/x/crypto GHSA-hcg3-q754-cr77 HIGH golang.org/x/crypto Vulnerable to Denial of Service (DoS) via Slow or Incomplete Key Exchange v0.11.0 0.35.0
ℹ️ Other Vulnerabilities (9)
Package CVE Severity Summary Unsafe Version Fixed In
golang.org/x/crypto GHSA-j5w8-q4qc-rx2x MODERATE golang.org/x/crypto/ssh allows an attacker to cause unbounded memory consumption v0.11.0 0.45.0
golang.org/x/crypto GHSA-f6x5-jh6r-wrfv MODERATE golang.org/x/crypto/ssh/agent vulnerable to panic if message is malformed due to out of bounds read v0.11.0 0.45.0
golang.org/x/crypto GHSA-45x7-px36-x8w8 MODERATE Prefix Truncation Attack against ChaCha20-Poly1305 and Encrypt-then-MAC aka Terrapin v0.11.0 0.17.0
golang.org/x/crypto GO-2023-2402 unknown Man-in-the-middle attacker can compromise integrity of secure channel in golang.org/x/crypto v0.11.0 0.17.0
golang.org/x/crypto GO-2025-4135 unknown Malformed constraint may cause denial of service in golang.org/x/crypto/ssh/agent v0.11.0 0.45.0
golang.org/x/crypto GO-2025-4134 unknown Unbounded memory consumption in golang.org/x/crypto/ssh v0.11.0 0.45.0
golang.org/x/crypto GO-2025-4116 unknown Potential denial of service in golang.org/x/crypto/ssh/agent v0.11.0 0.43.0
golang.org/x/crypto GO-2024-3321 unknown Misuse of connection.serverAuthenticate may cause authorization bypass in golang.org/x/crypto v0.11.0 0.31.0
golang.org/x/crypto GO-2025-3487 unknown Potential denial of service in golang.org/x/crypto v0.11.0 0.35.0

Review Checklist

Enhanced review recommended for this update:

  • Review changes for compatibility with your code
  • Check release notes for breaking changes
  • Run integration tests to verify service behavior
  • Test in staging environment before production
  • Monitor key metrics after deployment

Update Mode: Vulnerability Remediation (Critical/High)

🤖 Generated by DataDog Automated Dependency Management System

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants