Forwarding from
https://groups.google.com/g/golang-nuts/c/Gxn25BP4MXk/m/3KrM-XBOBAAJ
because I don't think I've seen it here on this list
yet.

----- Forwarded message from [email protected] -----

> Date: Tue, 7 Oct 2025 18:50:38 +0000
> From: [email protected]
> To: [email protected]
> Subject: [security] Go 1.25.2 and Go 1.24.8 are released
> 
> Hello gophers,
> 
> We have just released Go versions 1.25.2 and 1.24.8, minor point releases.
> 
> These minor releases include 10 security fixes following the security policy 
> <https://go.dev/security>:
> 
> -     net/mail: excessive CPU consumption in ParseAddress
> 
>       The ParseAddress function constructed domain-literal address components 
> through repeated string concatenation. When parsing large domain-literal 
> components, this could cause excessive CPU consumption.
> 
>       Thanks to Philippe Antoine (Catena cyber) for reporting this issue.
> 
>       This is CVE-2025-61725 and Go issue https://go.dev/issue/75680.
> 
> -     crypto/x509: quadratic complexity when checking name constraints
> 
>       Due to the design of the name constraint checking algorithm, the 
> processing time
>       of some inputs scales non-linearly with respect to the size of the 
> certificate.
> 
>       This affects programs which validate arbitrary certificate chains.
> 
>       Thanks to Jakub Ciolek for reporting this issue.
> 
>       This is CVE-2025-58187 and Go issue https://go.dev/issue/75681.
> 
> -     crypto/tls: ALPN negotiation errors can contain arbitrary text
> 
>       The crypto/tls conn.Handshake method returns an error on the 
> server-side when
>       ALPN negotation fails which can contain arbitrary attacker controlled
>       information provided by the client-side of the connection which is not 
> escaped.
> 
>       This affects programs which log these errors without any additional 
> form of
>       sanitization, and may allow injection of attacker controlled 
> information into
>       logs.
> 
>       Thanks to National Cyber Security Centre Finland for reporting this 
> issue.
> 
>       This is CVE-2025-58189 and Go issue https://go.dev/issue/75652.
> 
> -     encoding/pem: quadratic complexity when parsing some invalid inputs
> 
>       Due to the design of the PEM parsing function, the processing time for 
> some
>       inputs scales non-linearly with respect to the size of the input.
> 
>       This affects programs which parse untrusted PEM inputs.
> 
>       Thanks to Jakub Ciolek for reporting this issue.
> 
>       This is CVE-2025-61723 and Go issue https://go.dev/issue/75676.
> 
> -     net/url: insufficient validation of bracketed IPv6 hostnames
> 
>       The Parse function permitted values other than IPv6 addresses to be 
> included in square brackets within the host component of a URL. RFC 3986 
> permits IPv6 addresses to be included within the host component, enclosed 
> within square brackets. For example: "http://[::1]/";. IPv4 addresses and 
> hostnames must not appear within square brackets. Parse did not enforce this 
> requirement.
> 
>       Thanks to Enze Wang, Jingcheng Yang and Zehui Miao of Tsinghua 
> University for reporting this issue.
> 
>       This is CVE-2025-47912 and Go issue https://go.dev/issue/75678.
> 
> -     encoding/asn1: pre-allocating memory when parsing DER payload can cause 
> memory exhaustion
> 
>       When parsing DER payloads, memories were being allocated prior to fully 
> validating the payloads.
>       This permits an attacker to craft a big empty DER payload to cause 
> memory exhaustion in functions such as asn1.Unmarshal, 
> x509.ParseCertificateRequest, and ocsp.ParseResponse.
> 
>       Thanks to Jakub Ciolek for reporting this issue.
> 
>       This is CVE-2025-58185 and Go issue https://go.dev/issue/75671.
> 
> -     net/http: lack of limit when parsing cookies can cause memory exhaustion
> 
>       Despite HTTP headers having a default limit of 1 MB, the number of 
> cookies that can be parsed did not have a limit.
>       By sending a lot of very small cookies such as "a=;", an attacker can 
> make an HTTP server allocate a large amount of structs, causing large memory 
> consumption.
> 
>       net/http now limits the number of cookies accepted to 3000, which can 
> be adjusted using the httpcookiemaxnum GODEBUG option.
> 
>       Thanks to jub0bs for reporting this issue.
> 
>       This is CVE-2025-58186 and Go issue https://go.dev/issue/75672.
> 
> -     crypto/x509: panic when validating certificates with DSA public keys
> 
>       Validating certificate chains which contain DSA public keys can cause 
> programs
>       to panic, due to a interface cast that assumes they implement the Equal 
> method.
> 
>       This affects programs which validate arbitrary certificate chains.
> 
>       Thanks to Jakub Ciolek for reporting this issue.
> 
>       This is CVE-2025-58188 and Go issue https://go.dev/issue/75675.
> 
> -     archive/tar: unbounded allocation when parsing GNU sparse map
> 
>       tar.Reader did not set a maximum size on the number of sparse region 
> data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive 
> containing a large number of sparse regions could cause a Reader to read an 
> unbounded amount of data from the archive into memory. When reading from a 
> compressed source, a small compressed input could result in large allocations.
> 
>       Thanks to Harshit Gupta (Mr HAX) - 
> https://www.linkedin.com/in/iam-harshit-gupta/ for reporting this issue.
> 
>       This is CVE-2025-58183 and Go issue https://go.dev/issue/75677.
> 
> -     net/textproto: excessive CPU consumption in Reader.ReadResponse
> 
>       The Reader.ReadResponse function constructed a response string through
>       repeated string concatenation of lines. When the number of lines in a 
> response is large,
>       this could cause excessive CPU consumption.
> 
>       Thanks to Jakub Ciolek for reporting this issue.
> 
>       This is CVE-2025-61724 and Go issue https://go.dev/issue/75716.
> 
> View the release notes for more information:
> https://go.dev/doc/devel/release#go1.25.2
> 
> You can download binary and source distributions from the Go website:
> https://go.dev/dl/
> 
> To compile from source using a Git clone, update to the release with
> git checkout go1.25.2 and build as usual.
> 
> Thanks to everyone who contributed to the releases.
> 
> Cheers,
> Michael and Carlos for the Go team
> 
> -- 
> You received this message because you are subscribed to the Google Groups 
> "golang-announce" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to [email protected].
> To view this discussion visit 
> https://groups.google.com/d/msgid/golang-announce/459c470d.BAAAB6Txh8AAAAAAAAAAA-p9MGAAAYKKSQYAAAAAADE8OwBo5WD-%40mailjet.com.

----- End forwarded message -----

Reply via email to