Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-61725

Опубликовано: 29 окт. 2025
Источник: debian
EPSS Низкий

Описание

The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
golang-1.25fixed1.25.2-1package
golang-1.24fixed1.24.8-1package
golang-1.24no-dsatrixiepackage
golang-1.23removedpackage
golang-1.19removedpackage
golang-1.19no-dsabookwormpackage
golang-1.15removedpackage
golang-1.15postponedbullseyepackage

Примечания

  • https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI/m/qZN5nc-mBgAJ

  • https://github.com/golang/go/issues/75680

  • https://github.com/golang/go/commit/6a057327cf9a405e6388593dd4aedc0d0da77092 (go1.25.2)

  • https://github.com/golang/go/commit/bc6981fd74024098185a23ba3a83a81ed68a06c9 (go1.24.8)

EPSS

Процентиль: 8%
0.00031
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
3 месяца назад

The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.

CVSS3: 7.5
nvd
3 месяца назад

The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.

msrc
около 1 месяца назад

Excessive CPU consumption in ParseAddress in net/mail

CVSS3: 7.5
github
3 месяца назад

The ParseAddress function constructeds domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.

CVSS3: 7.5
fstec
4 месяца назад

Уязвимость функции ParseAddress() языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 8%
0.00031
Низкий