Source: golang-go.crypto
Version: 1:0.43.0-2
Severity: important
Tags: security upstream
Forwarded: https://github.com/golang/go/issues/76363
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for golang-go.crypto.

CVE-2025-58181[0]:
| SSH servers parsing GSSAPI authentication requests do not validate
| the number of mechanisms specified in the request, allowing an
| attacker to cause unbounded memory consumption.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-58181
    https://www.cve.org/CVERecord?id=CVE-2025-58181
[1] https://github.com/golang/go/issues/76363
[2] https://groups.google.com/g/golang-announce/c/w-oX3UxNcZA?pli=1
[3] 
https://github.com/golang/crypto/commit/e79546e28b85ea53dd37afe1c4102746ef553b9c

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to