SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.
References
| Link | Resource |
|---|---|
| https://go.dev/cl/721960 | Patch |
| https://go.dev/issue/76364 | Issue Tracking Patch |
| https://groups.google.com/g/golang-announce/c/w-oX3UxNcZA | Mailing List |
| https://pkg.go.dev/vuln/GO-2025-4135 | Vendor Advisory |
Configurations
History
11 Dec 2025, 19:36
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://go.dev/cl/721960 - Patch | |
| References | () https://go.dev/issue/76364 - Issue Tracking, Patch | |
| References | () https://groups.google.com/g/golang-announce/c/w-oX3UxNcZA - Mailing List | |
| References | () https://pkg.go.dev/vuln/GO-2025-4135 - Vendor Advisory | |
| First Time |
Golang crypto
Golang |
|
| CPE | cpe:2.3:a:golang:crypto:*:*:*:*:*:go:*:* |
19 Nov 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-19 21:15
Updated : 2025-12-11 19:36
NVD link : CVE-2025-47914
Mitre link : CVE-2025-47914
CVE.ORG link : CVE-2025-47914
JSON object : View
Products Affected
golang
- crypto
CWE
CWE-125
Out-of-bounds Read
