Source: golang-go.crypto
Version: 1:0.43.0-2
Severity: important
Tags: security upstream
Forwarded: https://github.com/golang/go/issues/76364
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for golang-go.crypto.

CVE-2025-47914[0]:
| SSH Agent servers do not validate the size of messages when
| processing new identity requests, which may cause the program to
| panic if the message is malformed due to an out of bounds read.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-47914
    https://www.cve.org/CVERecord?id=CVE-2025-47914
[1] https://github.com/golang/go/issues/76364
[2] 
https://github.com/golang/crypto/commit/f91f7a7c31bf90b39c1de895ad116a2bacc88748
[3] https://groups.google.com/g/golang-announce/c/w-oX3UxNcZA?pli=1

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to