[🐸 Frogbot] Update version of golang.org/x/crypto to 0.45.0 #175
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
📦 Vulnerable Dependencies
High
github.com/go-git/go-git/v5:v5.16.0
golang.org/x/net:v0.39.0
🔖 Details
Vulnerability Details
Unhandled data type in crypto/ssh may result in client denial of service when connecting to untrusted SSH agents
🔬 JFrog Research Details
Description:
The golang package x/crypto/ssh implements an SSH client and server.
It was found that when a client requests an operation that expects a specific-typed response, the
List()and theSignWithFlags()functions will crash if the response included an unexpected data type, such as theSSH_AGENT_SUCCESS(byte0x06) message.An example of a vulnerable client:
🐸 JFrog Frogbot