Skip to content

Conversation

@github-actions
Copy link
Contributor

🚨 This automated pull request was created by Frogbot and fixes the below:

📦 Vulnerable Dependencies

Severity ID Contextual Analysis Direct Dependencies Impacted Dependency Fixed Versions
medium
Medium
CVE-2025-58181 Not Covered github.com/jfrog/jfrog-cli-security:v1.22.0
golang.org/x/crypto:v0.43.0
github.com/jfrog/jfrog-client-go:v1.55.1-0.20251119183924-d765eb708cec
github.com/jfrog/jfrog-cli-artifactory:v0.7.3-0.20251118100843-ac34330a70d3
golang.org/x/crypto v0.43.0 [0.45.0]

🔖 Details

Vulnerability Details

Contextual Analysis: Not Covered
Direct Dependencies: github.com/jfrog/jfrog-cli-security:v1.22.0, golang.org/x/crypto:v0.43.0, github.com/jfrog/jfrog-client-go:v1.55.1-0.20251119183924-d765eb708cec, github.com/jfrog/jfrog-cli-artifactory:v0.7.3-0.20251118100843-ac34330a70d3
Impacted Dependency: golang.org/x/crypto:v0.43.0
Fixed Versions: [0.45.0]
CVSS V3: 5.3

SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.


@eyalk007 eyalk007 self-assigned this Nov 26, 2025
@eyalk007 eyalk007 self-requested a review November 26, 2025 10:11
@eyalk007 eyalk007 added dependencies Pull requests that update a dependency file safe to test Approve running integration tests on a pull request labels Nov 26, 2025
@github-actions github-actions bot removed the safe to test Approve running integration tests on a pull request label Nov 26, 2025
@github-actions
Copy link
Contributor Author

👍 Frogbot scanned this pull request and did not find any new security issues.


Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants