Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 19 Dec 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Golang
Golang go |
|
| Weaknesses | CWE-295 | |
| CPEs | cpe:2.3:a:golang:go:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Golang
Golang go |
Thu, 11 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1050 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 03 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Go Standard Library
Go Standard Library crypto Tls |
|
| Vendors & Products |
Go Standard Library
Go Standard Library crypto Tls |
Tue, 02 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 02 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption. | |
| Title | Excessive resource consumption when printing error string for host certificate validation in crypto/x509 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2025-12-03T19:37:14.903Z
Reserved: 2025-09-30T15:05:03.605Z
Link: CVE-2025-61729
Updated: 2025-12-02T21:52:53.822Z
Status : Analyzed
Published: 2025-12-02T19:15:51.447
Modified: 2025-12-19T18:25:28.283
Link: CVE-2025-61729
OpenCVE Enrichment
Updated: 2025-12-03T12:14:36Z