Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2026:0921

Опубликовано: 22 янв. 2026
Источник: rocky
Оценка: Important

Описание

Important: go-toolset:rhel8 security update

Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

Security Fix(es):

  • crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
golangx86_641.module+el8.10.0+40071+153b71d1golang-1.25.5-1.module+el8.10.0+40071+153b71d1.x86_64.rpm
golang-binx86_641.module+el8.10.0+40071+153b71d1golang-bin-1.25.5-1.module+el8.10.0+40071+153b71d1.x86_64.rpm
golang-docsnoarch1.module+el8.10.0+40071+153b71d1golang-docs-1.25.5-1.module+el8.10.0+40071+153b71d1.noarch.rpm
golang-docsnoarch1.module+el8.10.0+40071+153b71d1golang-docs-1.25.5-1.module+el8.10.0+40071+153b71d1.noarch.rpm
golang-miscnoarch1.module+el8.10.0+40071+153b71d1golang-misc-1.25.5-1.module+el8.10.0+40071+153b71d1.noarch.rpm
golang-miscnoarch1.module+el8.10.0+40071+153b71d1golang-misc-1.25.5-1.module+el8.10.0+40071+153b71d1.noarch.rpm
golang-racex86_641.module+el8.10.0+40071+153b71d1golang-race-1.25.5-1.module+el8.10.0+40071+153b71d1.x86_64.rpm
golang-srcnoarch1.module+el8.10.0+40071+153b71d1golang-src-1.25.5-1.module+el8.10.0+40071+153b71d1.noarch.rpm
golang-srcnoarch1.module+el8.10.0+40071+153b71d1golang-src-1.25.5-1.module+el8.10.0+40071+153b71d1.noarch.rpm
golang-testsnoarch1.module+el8.10.0+40071+153b71d1golang-tests-1.25.5-1.module+el8.10.0+40071+153b71d1.noarch.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 7.5
ubuntu
2 месяца назад

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

CVSS3: 7.5
nvd
2 месяца назад

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

msrc
2 месяца назад

Excessive resource consumption when printing error string for host certificate validation in crypto/x509

CVSS3: 7.5
debian
2 месяца назад

Within HostnameError.Error(), when constructing an error string, there ...

rocky
7 дней назад

Important: grafana-pcp security update