Skip to content

fix(deps): update module golang.org/x/crypto to v0.45.0 [security]#22

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/go-golang.org-x-crypto-vulnerability
Open

fix(deps): update module golang.org/x/crypto to v0.45.0 [security]#22
renovate[bot] wants to merge 1 commit intomainfrom
renovate/go-golang.org-x-crypto-vulnerability

Conversation

@renovate
Copy link

@renovate renovate bot commented Dec 12, 2024

This PR contains the following updates:

Package Change Age Confidence
golang.org/x/crypto v0.28.0v0.45.0 age confidence

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.

GitHub Vulnerability Alerts

CVE-2024-45337

Applications and libraries which misuse the ServerConfig.PublicKeyCallback callback may be susceptible to an authorization bypass.

The documentation for ServerConfig.PublicKeyCallback says that "A call to this function does not guarantee that the key offered is in fact used to authenticate." Specifically, the SSH protocol allows clients to inquire about whether a public key is acceptable before proving control of the corresponding private key. PublicKeyCallback may be called with multiple keys, and the order in which the keys were provided cannot be used to infer which key the client successfully authenticated with, if any. Some applications, which store the key(s) passed to PublicKeyCallback (or derived information) and make security relevant determinations based on it once the connection is established, may make incorrect assumptions.

For example, an attacker may send public keys A and B, and then authenticate with A. PublicKeyCallback would be called only twice, first with A and then with B. A vulnerable application may then make authorization decisions based on key B for which the attacker does not actually control the private key.

Since this API is widely misused, as a partial mitigation golang.org/x/crypto@v0.31.0 enforces the property that, when successfully authenticating via public key, the last key passed to ServerConfig.PublicKeyCallback will be the key used to authenticate the connection. PublicKeyCallback will now be called multiple times with the same key, if necessary. Note that the client may still not control the last key passed to PublicKeyCallback if the connection is then authenticated with a different method, such as PasswordCallback, KeyboardInteractiveCallback, or NoClientAuth.

Users should be using the Extensions field of the Permissions return value from the various authentication callbacks to record data associated with the authentication attempt instead of referencing external state. Once the connection is established the state corresponding to the successful authentication attempt can be retrieved via the ServerConn.Permissions field. Note that some third-party libraries misuse the Permissions type by sharing it across authentication attempts; users of third-party libraries should refer to the relevant projects for guidance.

CVE-2025-22869

SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.

CVE-2025-58181

SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.

CVE-2025-47914

SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate
Copy link
Author

renovate bot commented Dec 12, 2024

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 4 additional dependencies were updated

Details:

Package Change
golang.org/x/text v0.19.0 -> v0.22.0
golang.org/x/sys v0.26.0 -> v0.30.0
golang.org/x/term v0.25.0 -> v0.29.0
golang.org/x/sync v0.8.0 -> v0.11.0

@sourcery-ai
Copy link

sourcery-ai bot commented Dec 12, 2024

Reviewer's Guide by Sourcery

This PR updates the golang.org/x/crypto module from v0.28.0 to v0.31.0 to address a security vulnerability (CVE-2024-45337). The update includes changes to several dependent packages and their versions in go.mod and go.sum files. The security fix specifically addresses an authorization bypass vulnerability in the SSH protocol implementation.

No diagrams generated as the changes look simple and do not need a visual representation.

File-Level Changes

Change Details Files
Update of golang.org/x/crypto and related dependencies to patch security vulnerability
  • Update golang.org/x/crypto from v0.28.0 to v0.31.0
  • Update golang.org/x/text from v0.19.0 to v0.21.0
  • Update golang.org/x/sys from v0.26.0 to v0.28.0
  • Update golang.org/x/term from v0.25.0 to v0.27.0
  • Update golang.org/x/sync from v0.8.0 to v0.10.0
go.mod
go.sum

Tips and commands

Interacting with Sourcery

  • Trigger a new review: Comment @sourcery-ai review on the pull request.
  • Continue discussions: Reply directly to Sourcery's review comments.
  • Generate a GitHub issue from a review comment: Ask Sourcery to create an
    issue from a review comment by replying to it.
  • Generate a pull request title: Write @sourcery-ai anywhere in the pull
    request title to generate a title at any time.
  • Generate a pull request summary: Write @sourcery-ai summary anywhere in
    the pull request body to generate a PR summary at any time. You can also use
    this command to specify where the summary should be inserted.

Customizing Your Experience

Access your dashboard to:

  • Enable or disable review features such as the Sourcery-generated pull request
    summary, the reviewer's guide, and others.
  • Change the review language.
  • Add, remove or edit custom review instructions.
  • Adjust other review settings.

Getting Help

@coderabbitai
Copy link

coderabbitai bot commented Dec 12, 2024

Important

Review skipped

Bot user detected.

To trigger a single review, invoke the @coderabbitai review command.

You can disable this status message by setting the reviews.review_status to false in the CodeRabbit configuration file.

  • 🔍 Trigger a full review

Comment @coderabbitai help to get the list of available commands and usage tips.

Copy link

@sourcery-ai sourcery-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We have skipped reviewing this pull request. It seems to have been created by a bot (hey, renovate[bot]!). We assume it knows what it's doing!

@codiumai-pr-agent-free
Copy link

CI Failure Feedback 🧐

Action: go-tests

Failed stage: [❌]

Failure summary:

The action failed because no GitHub runner was available to execute the job. The system was waiting
for a runner to pick up the job but likely timed out or was cancelled before a runner became
available.

Relevant error logs:
1:  Job defined at: khulnasoft/devsecdb/.github/workflows/backend-tests.yml@refs/pull/22/merge
2:  Waiting for a runner to pick up this job...

✨ CI feedback usage guide:

The CI feedback tool (/checks) automatically triggers when a PR has a failed check.
The tool analyzes the failed checks and provides several feedbacks:

  • Failed stage
  • Failed test name
  • Failure summary
  • Relevant error logs

In addition to being automatically triggered, the tool can also be invoked manually by commenting on a PR:

/checks "https://github.com/{repo_name}/actions/runs/{run_number}/job/{job_number}"

where {repo_name} is the name of the repository, {run_number} is the run number of the failed check, and {job_number} is the job number of the failed check.

Configuration options

  • enable_auto_checks_feedback - if set to true, the tool will automatically provide feedback when a check is failed. Default is true.
  • excluded_checks_list - a list of checks to exclude from the feedback, for example: ["check1", "check2"]. Default is an empty list.
  • enable_help_text - if set to true, the tool will provide a help message with the feedback. Default is true.
  • persistent_comment - if set to true, the tool will overwrite a previous checks comment with the new feedback. Default is true.
  • final_update_message - if persistent_comment is true and updating a previous checks message, the tool will also create a new message: "Persistent checks updated to latest commit". Default is true.

See more information about the checks tool in the docs.

@renovate renovate bot changed the title fix(deps): update module golang.org/x/crypto to v0.31.0 [security] fix(deps): update module golang.org/x/crypto to v0.35.0 [security] Apr 18, 2025
@renovate renovate bot force-pushed the renovate/go-golang.org-x-crypto-vulnerability branch from de06aa8 to 871dc35 Compare April 18, 2025 04:22
@renovate renovate bot requested a review from NxPKG as a code owner April 18, 2025 04:22
@renovate renovate bot force-pushed the renovate/go-golang.org-x-crypto-vulnerability branch from 871dc35 to 447f5d8 Compare November 20, 2025 01:09
@renovate renovate bot changed the title fix(deps): update module golang.org/x/crypto to v0.35.0 [security] fix(deps): update module golang.org/x/crypto to v0.45.0 [security] Nov 20, 2025
@renovate
Copy link
Author

renovate bot commented Feb 3, 2026

ℹ️ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 7 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.23.2 -> 1.24.0
golang.org/x/text v0.19.0 -> v0.31.0
golang.org/x/mod v0.21.0 -> v0.29.0
golang.org/x/sys v0.26.0 -> v0.38.0
golang.org/x/term v0.25.0 -> v0.37.0
golang.org/x/net v0.30.0 -> v0.47.0
golang.org/x/sync v0.8.0 -> v0.18.0
golang.org/x/tools v0.26.0 -> v0.38.0

@renovate renovate bot force-pushed the renovate/go-golang.org-x-crypto-vulnerability branch from 447f5d8 to 21d619b Compare February 3, 2026 04:13
@renovate renovate bot force-pushed the renovate/go-golang.org-x-crypto-vulnerability branch from 21d619b to b05e4d7 Compare February 13, 2026 12:08
@renovate
Copy link
Author

renovate bot commented Feb 13, 2026

⚠️ Artifact update problem

Renovate failed to update an artifact related to this branch. You probably do not want to merge this PR as-is.

♻ Renovate will retry this branch, including artifacts, only when one of the following happens:

  • any of the package files in this branch needs updating, or
  • the branch becomes conflicted, or
  • you click the rebase/retry checkbox if found above, or
  • you rename this PR's title to start with "rebase!" to trigger it manually

The artifact failure details are included below:

File name: go.sum
Command failed: go get -t ./...
go: github.com/bytebase/tsql-parser@v0.0.0-20241114064553-239d32311c0b: invalid version: git ls-remote -q origin in /runner/cache/others/go/pkg/mod/cache/vcs/f9ce1e8d2b55f6aa2eb86ba99628f1fdb67f08dc167d76366730c43e36bc1b6b: exit status 128:
	remote: Repository not found.
	fatal: repository 'https://github.com/bytebase/tsql-parser/' not found

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants