Skip to content

Commit 88dcc34

Browse files
thatnealpatelgopherbot
authored andcommitted
data/reports: modify 2 reports
- data/reports/GO-2025-4134.yaml - data/reports/GO-2025-4135.yaml Updates #4134 Updates #4135 Fixes #4143 Fixes #4145 Change-Id: Ief26a0b20435e027c3b8dab6ef810d1b2abc848d Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/722381 Auto-Submit: Neal Patel <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]> Reviewed-by: Roland Shoemaker <[email protected]>
1 parent 3d8b4cf commit 88dcc34

File tree

6 files changed

+43
-41
lines changed

6 files changed

+43
-41
lines changed

data/cve/v5/GO-2025-4134.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
"providerMetadata": {
1010
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
1111
},
12-
"title": "CVE-2025-58181 in golang.org/x/crypto/ssh",
12+
"title": "Unbounded memory consumption in golang.org/x/crypto/ssh",
1313
"descriptions": [
1414
{
1515
"lang": "en",
@@ -22,6 +22,14 @@
2222
"product": "golang.org/x/crypto/ssh",
2323
"collectionURL": "https://pkg.go.dev",
2424
"packageName": "golang.org/x/crypto/ssh",
25+
"versions": [
26+
{
27+
"version": "0",
28+
"lessThan": "0.45.0",
29+
"status": "affected",
30+
"versionType": "semver"
31+
}
32+
],
2533
"programRoutines": [
2634
{
2735
"name": "parseGSSAPIPayload"
@@ -30,7 +38,7 @@
3038
"name": "NewServerConn"
3139
}
3240
],
33-
"defaultStatus": "affected"
41+
"defaultStatus": "unaffected"
3442
}
3543
],
3644
"problemTypes": [

data/cve/v5/GO-2025-4135.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
"providerMetadata": {
1010
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
1111
},
12-
"title": "CVE-2025-47914 in golang.org/x/crypto/ssh/agent",
12+
"title": "Malformed constraint may cause denial of service in golang.org/x/crypto/ssh/agent",
1313
"descriptions": [
1414
{
1515
"lang": "en",
@@ -22,6 +22,14 @@
2222
"product": "golang.org/x/crypto/ssh/agent",
2323
"collectionURL": "https://pkg.go.dev",
2424
"packageName": "golang.org/x/crypto/ssh/agent",
25+
"versions": [
26+
{
27+
"version": "0",
28+
"lessThan": "0.45.0",
29+
"status": "affected",
30+
"versionType": "semver"
31+
}
32+
],
2533
"programRoutines": [
2634
{
2735
"name": "parseConstraints"
@@ -33,7 +41,7 @@
3341
"name": "ServeAgent"
3442
}
3543
],
36-
"defaultStatus": "affected"
44+
"defaultStatus": "unaffected"
3745
}
3846
],
3947
"problemTypes": [

data/osv/GO-2025-4134.json

Lines changed: 6 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,10 @@
44
"modified": "0001-01-01T00:00:00Z",
55
"published": "0001-01-01T00:00:00Z",
66
"aliases": [
7-
"CVE-2025-58181"
7+
"CVE-2025-58181",
8+
"GHSA-j5w8-q4qc-rx2x"
89
],
9-
"summary": "CVE-2025-58181 in golang.org/x/crypto/ssh",
10+
"summary": "Unbounded memory consumption in golang.org/x/crypto/ssh",
1011
"details": "SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.",
1112
"affected": [
1213
{
@@ -20,6 +21,9 @@
2021
"events": [
2122
{
2223
"introduced": "0"
24+
},
25+
{
26+
"fixed": "0.45.0"
2327
}
2428
]
2529
}
@@ -33,19 +37,6 @@
3337
"parseGSSAPIPayload"
3438
]
3539
}
36-
],
37-
"custom_ranges": [
38-
{
39-
"type": "ECOSYSTEM",
40-
"events": [
41-
{
42-
"introduced": "0"
43-
},
44-
{
45-
"fixed": "0.45.0"
46-
}
47-
]
48-
}
4940
]
5041
}
5142
}

data/osv/GO-2025-4135.json

Lines changed: 6 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,10 @@
44
"modified": "0001-01-01T00:00:00Z",
55
"published": "0001-01-01T00:00:00Z",
66
"aliases": [
7-
"CVE-2025-47914"
7+
"CVE-2025-47914",
8+
"GHSA-f6x5-jh6r-wrfv"
89
],
9-
"summary": "CVE-2025-47914 in golang.org/x/crypto/ssh/agent",
10+
"summary": "Malformed constraint may cause denial of service in golang.org/x/crypto/ssh/agent",
1011
"details": "SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.",
1112
"affected": [
1213
{
@@ -20,6 +21,9 @@
2021
"events": [
2122
{
2223
"introduced": "0"
24+
},
25+
{
26+
"fixed": "0.45.0"
2327
}
2428
]
2529
}
@@ -34,19 +38,6 @@
3438
"parseConstraints"
3539
]
3640
}
37-
],
38-
"custom_ranges": [
39-
{
40-
"type": "ECOSYSTEM",
41-
"events": [
42-
{
43-
"introduced": "0"
44-
},
45-
{
46-
"fixed": "0.45.0"
47-
}
48-
]
49-
}
5041
]
5142
}
5243
}

data/reports/GO-2025-4134.yaml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
id: GO-2025-4134
22
modules:
33
- module: golang.org/x/crypto
4-
non_go_versions:
4+
versions:
55
- fixed: 0.45.0
66
vulnerable_at: 0.44.0
77
packages:
@@ -10,11 +10,13 @@ modules:
1010
- parseGSSAPIPayload
1111
derived_symbols:
1212
- NewServerConn
13-
summary: CVE-2025-58181 in golang.org/x/crypto/ssh
13+
summary: Unbounded memory consumption in golang.org/x/crypto/ssh
1414
description: |-
1515
SSH servers parsing GSSAPI authentication requests do not validate the number of
1616
mechanisms specified in the request, allowing an attacker to cause unbounded
1717
memory consumption.
18+
ghsas:
19+
- GHSA-j5w8-q4qc-rx2x
1820
credits:
1921
- Jakub Ciolek
2022
references:

data/reports/GO-2025-4135.yaml

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
id: GO-2025-4135
22
modules:
33
- module: golang.org/x/crypto
4-
non_go_versions:
4+
versions:
55
- fixed: 0.45.0
66
vulnerable_at: 0.44.0
77
packages:
@@ -11,11 +11,13 @@ modules:
1111
derived_symbols:
1212
- ForwardToAgent
1313
- ServeAgent
14-
summary: CVE-2025-47914 in golang.org/x/crypto/ssh/agent
14+
summary: Malformed constraint may cause denial of service in golang.org/x/crypto/ssh/agent
1515
description: |-
16-
SSH Agent servers do not validate the size of messages when processing new
17-
identity requests, which may cause the program to panic if the message is
18-
malformed due to an out of bounds read.
16+
SSH Agent servers do not validate the size of messages when processing
17+
new identity requests, which may cause the program to panic if the
18+
message is malformed due to an out of bounds read.
19+
ghsas:
20+
- GHSA-f6x5-jh6r-wrfv
1921
credits:
2022
- Jakub Ciolek
2123
references:

0 commit comments

Comments
 (0)