CVE-2025-61729Improper Certificate Validation in Standard Library Crypto X509

Severity
7.5HIGHNVD
EPSS
0.0%
top 93.86%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 2
Latest updateDec 9

Description

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

NVDgolang/go1.25.01.25.5+1
CVEListV5go_standard_library/crypto_x5091.25.01.25.5+1

Patches

🔴Vulnerability Details

4
CVEList
Excessive resource consumption when printing error string for host certificate validation in crypto/x5092025-12-02
OSV
Excessive resource consumption when printing error string for host certificate validation in crypto/x5092025-12-02
GHSA
GHSA-7c64-f9jr-v9h2: Within HostnameError2025-12-02
OSV
CVE-2025-61729: Within HostnameError2025-12-02

📋Vendor Advisories

3
Microsoft
Excessive resource consumption when printing error string for host certificate validation in crypto/x5092025-12-09
Red Hat
crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate2025-12-02
Debian
CVE-2025-61729: golang-1.15 - Within HostnameError.Error(), when constructing an error string, there is no lim...2025

💬Community

1
Bugzilla
CVE-2025-61729 crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate2025-12-02
CVE-2025-61729 — Improper Certificate Validation | cvebase