OESA-2025-2648

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-2648
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-2648.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2025-2648
Upstream
  • CVE-2025-58183
  • CVE-2025-58185
  • CVE-2025-58189
  • CVE-2025-61724
Published
2025-11-14T12:38:05Z
Modified
2025-11-14T13:02:50.596810Z
Summary
golang security update
Details

.

Security Fix(es):

tar.Reader in the Go archive/tar component did not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions could cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input could result in large allocations.(CVE-2025-58183)

In Go before 1.24.8 and 1.25.x before 1.25.2, when parsing DER payloads, memories were being allocated prior to fully validating the payloads. This permits an attacker to craft a big empty DER payload to cause memory exhaustion in functions such as asn1.Unmarshal, x509.ParseCertificateRequest, and ocsp.ParseResponse.(CVE-2025-58185)

In Go before 1.24.8 and 1.25.x before 1.25.2, When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped. The impact for this is relatively limited.(CVE-2025-58189)

In Go before 1.24.8 and 1.25.x before 1.25.2, The Reader.ReadResponse function constructed a response string through repeated string concatenation of lines. When the number of lines in a response is large, this could cause excessive CPU consumption.(CVE-2025-61724)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:22.03-LTS-SP3 / golang

Package

Name
golang
Purl
pkg:rpm/openEuler/golang&distro=openEuler-22.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.17.3-43.oe2203sp3

Ecosystem specific

{
    "src": [
        "golang-1.17.3-43.oe2203sp3.src.rpm"
    ],
    "noarch": [
        "golang-devel-1.17.3-43.oe2203sp3.noarch.rpm",
        "golang-help-1.17.3-43.oe2203sp3.noarch.rpm"
    ],
    "x86_64": [
        "golang-1.17.3-43.oe2203sp3.x86_64.rpm"
    ],
    "aarch64": [
        "golang-1.17.3-43.oe2203sp3.aarch64.rpm"
    ]
}