Logo
Explore SSH Host Keys Package Repositories Git Workflow Documentation Help
Sign In
pool/mcphost
SHA256
16
0
Fork 0
You've already forked mcphost
Code Issues Pull Requests Activity
Files
factory
mcphost/_service

8 lines
165 B
Plaintext
Raw Permalink Normal View History

- Fix CVEs * GO-2025-4135 (CVE-2025-47914) SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read. * GO-2025-4116 (CVE-2025-47913) SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process. * GO-2025-4134 (CVE-2025-58181, bsc#1253952). SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption. Signed-off-by: Egbert Eich <eich@suse.com>
2026-01-05 10:13:46 +01:00
<services>
<service name="go_modules" mode="manual">
<param name="replace">
golang.org/x/crypto=golang.org/x/crypto@v0.45.0
</param>
</service>
</services>
Reference in New Issue Copy Permalink
Powered by Gitea Version: 1.25.4 Page: 50ms Template: 1ms
English
Bahasa Indonesia Deutsch English Español Français Gaeilge Italiano Latviešu Magyar nyelv Nederlands Polski Português de Portugal Português do Brasil Suomi Svenska Türkçe Čeština Ελληνικά Български Русский Українська فارسی മലയാളം 日本語 简体中文 繁體中文(台灣) 繁體中文(香港) 한국어
Licenses API