Critical Go Crypto Update Patches SSH Server Memory Exhaustion Flaws (CVE-2025-58181, CVE-2025-47914)
A critical security update for the widely-used `golang.org/x/crypto` library patches two severe vulnerabilities in SSH servers that could allow attackers to trigger unbounded memory consumption and denial-of-service attacks. The update, jumping from version 0.37.0 to 0.45.0, addresses flaws that directly impact the stability and security of any Go-based service handling SSH connections, including servers, agents, and infrastructure tools.
The first vulnerability, CVE-2025-58181, resides in SSH servers that parse GSSAPI authentication requests. The flaw stems from a failure to validate the number of mechanisms specified in a request, enabling a malicious actor to craft a payload that forces the server to allocate memory without bound, potentially crashing the service. The second, CVE-2025-47914, affects SSH Agent servers, which fail to validate the size of messages, opening another vector for resource exhaustion.
This mandatory update signals immediate pressure on development and DevOps teams to patch dependencies. The vulnerabilities are not theoretical; they are exploitable weaknesses in a core library used by countless cloud-native applications, CI/CD pipelines, and backend systems. Failure to apply this fix leaves infrastructure exposed to trivial denial-of-service attacks that could disrupt critical operations. The update's broad scope—spanning eight minor versions—underscores the severity of the underlying security gaps now being closed.