Skip to content

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Nov 20, 2025

Bumps golang.org/x/crypto from 0.35.0 to 0.45.0.

Commits
  • 4e0068c go.mod: update golang.org/x dependencies
  • e79546e ssh: curb GSSAPI DoS risk by limiting number of specified OIDs
  • f91f7a7 ssh/agent: prevent panic on malformed constraint
  • 2df4153 acme/autocert: let automatic renewal work with short lifetime certs
  • bcf6a84 acme: pass context to request
  • b4f2b62 ssh: fix error message on unsupported cipher
  • 79ec3a5 ssh: allow to bind to a hostname in remote forwarding
  • 122a78f go.mod: update golang.org/x dependencies
  • c0531f9 all: eliminate vet diagnostics
  • 0997000 all: fix some comments
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [golang.org/x/crypto](https://github.com/golang/crypto) from 0.35.0 to 0.45.0.
- [Commits](golang/crypto@v0.35.0...v0.45.0)

---
updated-dependencies:
- dependency-name: golang.org/x/crypto
  dependency-version: 0.45.0
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update go code labels Nov 20, 2025
@dependabot dependabot bot requested a review from jdolitsky as a code owner November 20, 2025 01:34
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update go code labels Nov 20, 2025
@netlify
Copy link

netlify bot commented Nov 20, 2025

Deploy Preview for oci-conformance ready!

Name Link
🔨 Latest commit 92d0476
🔍 Latest deploy log https://app.netlify.com/projects/oci-conformance/deploys/691e70427ff92200086eaa18
😎 Deploy Preview https://deploy-preview-128--oci-conformance.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

Copy link
Contributor

@sudo-bmitch sudo-bmitch left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The project is not currently vulnerable, but previous updates (probably dependabot) have broken the go.mod with a go 1.22.6 version that needs to be bumped because of the updated dependencies. So I'll approve to get that sorted.

Here's the current main branch after a go mod tidy:

$ govulncheck -show verbose .
Fetching vulnerabilities from the database...

Checking the code against the vulnerabilities...

The package pattern matched the following root package:
  github.com/opencontainers/oci-conformance/products-page-generator
Govulncheck scanned the following 12 modules and the go1.25.4 standard library:
  github.com/opencontainers/oci-conformance/products-page-generator
  github.com/Masterminds/[email protected]
  github.com/Masterminds/[email protected]
  github.com/Masterminds/[email protected]+incompatible
  github.com/google/[email protected]
  github.com/huandu/[email protected]
  github.com/imdario/[email protected]
  github.com/joshdk/[email protected]
  github.com/mitchellh/[email protected]
  github.com/mitchellh/[email protected]
  golang.org/x/[email protected]
  gopkg.in/[email protected]

=== Symbol Results ===

No vulnerabilities found.

=== Package Results ===

No other vulnerabilities found.

=== Module Results ===

Vulnerability #1: GO-2025-4135
    CVE-2025-47914 in golang.org/x/crypto/ssh/agent
  More info: https://pkg.go.dev/vuln/GO-2025-4135
  Module: golang.org/x/crypto
    Found in: golang.org/x/[email protected]
    Fixed in: N/A

Vulnerability #2: GO-2025-4134
    CVE-2025-58181 in golang.org/x/crypto/ssh
  More info: https://pkg.go.dev/vuln/GO-2025-4134
  Module: golang.org/x/crypto
    Found in: golang.org/x/[email protected]
    Fixed in: N/A

Vulnerability #3: GO-2025-4116
    Potential denial of service in golang.org/x/crypto/ssh/agent
  More info: https://pkg.go.dev/vuln/GO-2025-4116
  Module: golang.org/x/crypto
    Found in: golang.org/x/[email protected]
    Fixed in: golang.org/x/[email protected]

Your code is affected by 0 vulnerabilities.
This scan also found 0 vulnerabilities in packages you import and 3
vulnerabilities in modules you require, but your code doesn't appear to call
these vulnerabilities.

And after applying this PR:

$ govulncheck -show verbose .
Fetching vulnerabilities from the database...

Checking the code against the vulnerabilities...

The package pattern matched the following root package:
  github.com/opencontainers/oci-conformance/products-page-generator
Govulncheck scanned the following 12 modules and the go1.25.4 standard library:
  github.com/opencontainers/oci-conformance/products-page-generator
  github.com/Masterminds/[email protected]
  github.com/Masterminds/[email protected]
  github.com/Masterminds/[email protected]+incompatible
  github.com/google/[email protected]
  github.com/huandu/[email protected]
  github.com/imdario/[email protected]
  github.com/joshdk/[email protected]
  github.com/mitchellh/[email protected]
  github.com/mitchellh/[email protected]
  golang.org/x/[email protected]
  gopkg.in/[email protected]

=== Symbol Results ===

No vulnerabilities found.

=== Package Results ===

No other vulnerabilities found.

=== Module Results ===

Vulnerability #1: GO-2025-4135
    CVE-2025-47914 in golang.org/x/crypto/ssh/agent
  More info: https://pkg.go.dev/vuln/GO-2025-4135
  Module: golang.org/x/crypto
    Found in: golang.org/x/[email protected]
    Fixed in: N/A

Vulnerability #2: GO-2025-4134
    CVE-2025-58181 in golang.org/x/crypto/ssh
  More info: https://pkg.go.dev/vuln/GO-2025-4134
  Module: golang.org/x/crypto
    Found in: golang.org/x/[email protected]
    Fixed in: N/A

Your code is affected by 0 vulnerabilities.
This scan also found 0 vulnerabilities in packages you import and 2
vulnerabilities in modules you require, but your code doesn't appear to call
these vulnerabilities.

@sudo-bmitch sudo-bmitch merged commit cd5b848 into main Nov 20, 2025
5 checks passed
@dependabot dependabot bot deleted the dependabot/go_modules/products-page-generator/golang.org/x/crypto-0.45.0 branch November 20, 2025 22:19
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file go Pull requests that update go code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants