The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.
References
| Link | Resource |
|---|---|
| https://go.dev/cl/709858 | Patch |
| https://go.dev/issue/75676 | Issue Tracking |
| https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI | Mailing List Release Notes |
| https://pkg.go.dev/vuln/GO-2025-4009 | Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2025/10/08/1 | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-10-29 23:16
Updated : 2026-01-29 15:49
NVD link : CVE-2025-61723
Mitre link : CVE-2025-61723
CVE.ORG link : CVE-2025-61723
JSON object : View
Products Affected
golang
- go
CWE
CWE-770
Allocation of Resources Without Limits or Throttling
