Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-47914

Опубликовано: 19 нояб. 2025
Источник: debian
EPSS Низкий

Описание

SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
golang-go.cryptofixed1:0.45.0-1package
golang-go.cryptono-dsatrixiepackage
golang-go.cryptono-dsabookwormpackage
golang-go.cryptopostponedbullseyepackage

Примечания

  • https://groups.google.com/g/golang-announce/c/w-oX3UxNcZA?pli=1

  • https://github.com/golang/go/issues/76364

  • Fixed by: https://github.com/golang/crypto/commit/f91f7a7c31bf90b39c1de895ad116a2bacc88748 (v0.45.0)

EPSS

Процентиль: 6%
0.00021
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
4 месяца назад

SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.

CVSS3: 5.3
redhat
4 месяца назад

SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.

CVSS3: 5.3
nvd
4 месяца назад

SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.

suse-cvrf
3 месяца назад

Security update for podman

CVSS3: 5.3
github
4 месяца назад

golang.org/x/crypto/ssh/agent vulnerable to panic if message is malformed due to out of bounds read

EPSS

Процентиль: 6%
0.00021
Низкий