Skip to content

update to go1.25.5#51648

Merged
thaJeztah merged 1 commit intomoby:masterfrom
vvoland:update-go
Dec 2, 2025
Merged

update to go1.25.5#51648
thaJeztah merged 1 commit intomoby:masterfrom
vvoland:update-go

Conversation

@vvoland
Copy link
Contributor

@vvoland vvoland commented Dec 2, 2025

These releases include 2 security fixes following the security policy:

  • crypto/x509: excessive resource consumption in printing error string for host certificate validation

    Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out.
    Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime.

    Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.
    HostnameError.Error() now limits the number of hosts and utilizes strings.Builder when constructing an error string.

    Thanks to Philippe Antoine (Catena cyber) for reporting this issue.

    This is CVE-2025-61729 and Go issue https://go.dev/issue/76445.

  • crypto/x509: excluded subdomain constraint does not restrict wildcard SANs

    An excluded subdomain constraint in a certificate chain does not restrict the
    usage of wildcard SANs in the leaf certificate. For example a constraint that
    excludes the subdomain test.example.com does not prevent a leaf certificate from
    claiming the SAN *.example.com.

    This is CVE-2025-61727 and Go issue https://go.dev/issue/76442.

View the release notes for more information

- Description for the changelog

Update Go runtime to [1.25.5](https://go.dev/doc/devel/release#go1.25.5)

Copy link
Member

@thaJeztah thaJeztah left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

assuming green once the images are up

@thaJeztah
Copy link
Member

Failure should hopefully be addressed by #51649

These releases include 2 security fixes following the security policy:

- crypto/x509: excessive resource consumption in printing error string for host certificate validation

    Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out.
    Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime.

    Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.
    HostnameError.Error() now limits the number of hosts and utilizes strings.Builder when constructing an error string.

    Thanks to Philippe Antoine (Catena cyber) for reporting this issue.

    This is CVE-2025-61729 and Go issue https://go.dev/issue/76445.

- crypto/x509: excluded subdomain constraint does not restrict wildcard SANs

    An excluded subdomain constraint in a certificate chain does not restrict the
    usage of wildcard SANs in the leaf certificate. For example a constraint that
    excludes the subdomain test.example.com does not prevent a leaf certificate from
    claiming the SAN *.example.com.

    This is CVE-2025-61727 and Go issue https://go.dev/issue/76442.

View the release notes for more information:
https://go.dev/doc/devel/release#go1.25.5

Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
@thaJeztah
Copy link
Member

Rebased, after #51649 was merged

@thaJeztah thaJeztah merged commit de45c2a into moby:master Dec 2, 2025
288 of 290 checks passed
kaosagnt added a commit to kaosagnt/toolbox2docker that referenced this pull request Dec 4, 2025
Update Go runtime to 1.25.5. moby/moby#51648, docker/cli#6688

Fixes a potential DoS via excessive resource usage when formatting hostname
validation errors CVE-2025-61729

Fixes incorrect enforcement of excluded subdomain constraints for wildcard
SANs, which could allow improperly trusted certificates CVE-2025-61727
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants