Skip to content
This repository was archived by the owner on Nov 19, 2025. It is now read-only.

chore(deps): update module golang.org/x/crypto to v0.35.0 [security]#61

Merged
NumaryBot merged 1 commit intomainfrom
renovate/go-golang.org-x-crypto-vulnerability
Sep 9, 2025
Merged

chore(deps): update module golang.org/x/crypto to v0.35.0 [security]#61
NumaryBot merged 1 commit intomainfrom
renovate/go-golang.org-x-crypto-vulnerability

Conversation

@NumaryBot
Copy link
Contributor

@NumaryBot NumaryBot commented Sep 9, 2025

This PR contains the following updates:

Package Type Update Change
golang.org/x/crypto indirect minor v0.32.0 -> v0.35.0

GitHub Vulnerability Alerts

CVE-2025-22869

SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.


Potential denial of service in golang.org/x/crypto

CVE-2025-22869 / GHSA-hcg3-q754-cr77 / GO-2025-3487

More information

Details

SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


golang.org/x/crypto Vulnerable to Denial of Service (DoS) via Slow or Incomplete Key Exchange

CVE-2025-22869 / GHSA-hcg3-q754-cr77 / GO-2025-3487

More information

Details

SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.

Severity

  • CVSS Score: 7.5 / 10 (High)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@NumaryBot NumaryBot enabled auto-merge (squash) September 9, 2025 10:51
@NumaryBot
Copy link
Contributor Author

NumaryBot commented Sep 9, 2025

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 2 additional dependencies were updated

Details:

Package Change
golang.org/x/sys v0.29.0 -> v0.30.0
golang.org/x/text v0.21.0 -> v0.22.0

@coderabbitai
Copy link
Contributor

coderabbitai bot commented Sep 9, 2025

Important

Review skipped

Review was skipped due to path filters

⛔ Files ignored due to path filters (2)
  • go.mod is excluded by !**/*.mod
  • go.sum is excluded by !**/*.sum, !**/*.sum

CodeRabbit blocks several paths by default. You can override this behavior by explicitly including those paths in the path filters. For example, including **/dist/** will override the default block on the dist directory, by removing the pattern from both the lists.

You can disable this status message by setting the reviews.review_status to false in the CodeRabbit configuration file.

✨ Finishing Touches
🧪 Generate unit tests
  • Create PR with unit tests
  • Post copyable unit tests in a comment
  • Commit unit tests in branch renovate/go-golang.org-x-crypto-vulnerability

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

Copy link
Member

@flemzord flemzord left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@NumaryBot NumaryBot force-pushed the renovate/go-golang.org-x-crypto-vulnerability branch from 426830d to 9fd8a89 Compare September 9, 2025 12:56
@NumaryBot NumaryBot removed the security label Sep 9, 2025
@NumaryBot NumaryBot merged commit 650bfd3 into main Sep 9, 2025
6 checks passed
@NumaryBot NumaryBot deleted the renovate/go-golang.org-x-crypto-vulnerability branch September 9, 2025 12:59
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants