Search for packages
| purl | pkg:deb/debian/golang-1.24@1.24.9-1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1aty-87pz-5yb8 | database/sql: Postgres Scan Race Condition |
CVE-2025-47907
|
| VCID-254d-pjst-c7hx | golang.org/net/http: Lack of limit when parsing cookies can cause memory exhaustion in net/http |
CVE-2025-58186
|
| VCID-3nqb-6mna-jyb4 | net/textproto: Excessive CPU consumption in Reader.ReadResponse in net/textproto |
CVE-2025-61724
|
| VCID-5n8q-zcds-gyen | cmd/go: Go VCS Command Execution Vulnerability |
CVE-2025-4674
|
| VCID-5q9b-a7c4-1yht | golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip |
CVE-2025-61728
|
| VCID-7n3z-vwk2-3ydr | crypto/x509: golang: Panic when validating certificates with DSA public keys in crypto/x509 |
CVE-2025-58188
|
| VCID-9ky3-s2vk-cuge | golang: crypto/x509: excluded subdomain constraint does not restrict wildcard SANs |
CVE-2025-61727
|
| VCID-br2f-7ux9-hkhg | encoding/pem: Quadratic complexity when parsing some invalid inputs in encoding/pem |
CVE-2025-61723
|
| VCID-bv1f-bee8-cbek | net/mail: Excessive CPU consumption in ParseAddress in net/mail |
CVE-2025-61725
|
| VCID-csmt-e61b-tued | cmd/go: cmd/go: Arbitrary file write via malicious pkg-config directive |
CVE-2025-61731
|
| VCID-dp1t-v58b-43du | crypto/tls: Unexpected session resumption in crypto/tls |
CVE-2025-68121
|
| VCID-dtt9-gmqf-nbaf | golang: net/url: Memory exhaustion in query parameter parsing in net/url |
CVE-2025-61726
|
| VCID-eyev-qpgs-hfbx | cmd/cgo: Go cgo: Code smuggling due to comment parsing discrepancy |
CVE-2025-61732
|
| VCID-hay4-q9m3-ekdj | crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate |
CVE-2025-61729
|
| VCID-je6z-v5qw-ufew | During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake. |
CVE-2025-61730
|
| VCID-mvsr-c2yh-mbdq | golang: archive/tar: Unbounded allocation when parsing GNU sparse map |
CVE-2025-58183
|
| VCID-q9yj-ze4x-qyfr | crypto/x509: Quadratic complexity when checking name constraints in crypto/x509 |
CVE-2025-58187
|
| VCID-rvbr-nser-sfe7 | os/exec: Unexpected paths returned from LookPath in os/exec |
CVE-2025-47906
|
| VCID-sb3w-x3yv-ffft | net/url: Insufficient validation of bracketed IPv6 hostnames in net/url |
CVE-2025-47912
|
| VCID-t2dr-6dz3-7qgt | encoding/asn1: Parsing DER payload can cause memory exhaustion in encoding/asn1 |
CVE-2025-58185
|
| VCID-usyf-s559-pkgx | crypto/tls: go crypto/tls ALPN negotiation error contains attacker controlled information |
CVE-2025-58189
|
| VCID-wchc-as62-1fae | cmd/go: cmd/go: Local code execution and arbitrary file write via malicious module version strings |
CVE-2025-68119
|