OESA-2025-2867

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-2867
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-2867.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2025-2867
Upstream
Published
2025-12-30T12:16:31Z
Modified
2025-12-30T13:00:06.566335Z
Summary
golang security update
Details

.

Security Fix(es):

crypto/x509: Exclude subdomain constraints do not restrict wildcard SANs Exclude subdomain constraints in certificate chains do not restrict the use of wildcard SANs in leaf certificates. For example, excluding the constraint on the subdomain test.example.com does not prevent the leaf certificate from claiming SAN*. example.com.(CVE-2025-61727)

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.(CVE-2025-61729)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:24.03-LTS-SP1 / golang

Package

Name
golang
Purl
pkg:rpm/openEuler/golang&distro=openEuler-24.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.21.4-42.oe2403sp1

Ecosystem specific

{
    "noarch": [
        "golang-devel-1.21.4-42.oe2403sp1.noarch.rpm",
        "golang-help-1.21.4-42.oe2403sp1.noarch.rpm"
    ],
    "src": [
        "golang-1.21.4-42.oe2403sp1.src.rpm"
    ],
    "aarch64": [
        "golang-1.21.4-42.oe2403sp1.aarch64.rpm"
    ],
    "x86_64": [
        "golang-1.21.4-42.oe2403sp1.x86_64.rpm"
    ]
}