Overview
- Go standard library
- crypto/tls
- crypto/tls
08 Apr 2026
Published
13 Apr 2026
Updated
CVSS
Pending
EPSS
0.02%
KEV
Description
If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3.
Statistics
- 6 Posts
Last activity: 16 hours ago
Bluesky
This addresses the following vulnerabilities: CVE-2026-39883 CVE-2026-34986 CVE-2026-33186 CVE-2026-32283 CVE-2026-32281 CVE-2026-32280 CVE-2026-29181 CVE-2026-27144 CVE-2026-27143 CVE-2026-27140 CVE-2026-25679 N/A Security fixes for apigee-watcher
Overview
- Go toolchain
- cmd/go
- cmd/go
08 Apr 2026
Published
13 Apr 2026
Updated
CVSS
Pending
EPSS
0.01%
KEV
Description
SWIG file names containing 'cgo' and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass.
Statistics
- 6 Posts
Last activity: 16 hours ago
Bluesky
This addresses the following vulnerabilities: CVE-2026-39883 CVE-2026-34986 CVE-2026-33186 CVE-2026-32283 CVE-2026-32281 CVE-2026-32280 CVE-2026-29181 CVE-2026-27144 CVE-2026-27143 CVE-2026-27140 CVE-2026-25679 N/A Security fixes for apigee-watcher
Overview
- Go standard library
- crypto/x509
- crypto/x509
08 Apr 2026
Published
13 Apr 2026
Updated
CVSS
Pending
EPSS
0.02%
KEV
Description
Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.
Statistics
- 6 Posts
Last activity: 16 hours ago
Bluesky
This addresses the following vulnerabilities: CVE-2026-39883 CVE-2026-34986 CVE-2026-33186 CVE-2026-32283 CVE-2026-32281 CVE-2026-32280 CVE-2026-29181 CVE-2026-27144 CVE-2026-27143 CVE-2026-27140 CVE-2026-25679 N/A Security fixes for apigee-watcher
Overview
- open-telemetry
- opentelemetry-go
07 Apr 2026
Published
08 Apr 2026
Updated
CVSS v3.1
HIGH (7.5)
EPSS
0.05%
KEV
Description
OpenTelemetry-Go is the Go implementation of OpenTelemetry. From 1.36.0 to 1.40.0, multi-value baggage: header extraction parses each header field-value independently and aggregates members across values. This allows an attacker to amplify cpu and allocations by sending many baggage: header lines, even when each individual value is within the 8192-byte per-value parse limit. This vulnerability is fixed in 1.41.0.
Statistics
- 4 Posts
Last activity: 16 hours ago
Overview
- grpc
- grpc-go
20 Mar 2026
Published
24 Mar 2026
Updated
CVSS v3.1
CRITICAL (9.1)
EPSS
0.02%
KEV
Description
gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated the raw, non-canonical path string. Consequently, "deny" rules defined using canonical paths (starting with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback "allow" rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific "deny" rules for canonical paths but allows other requests by default (a fallback "allow" rule). The vulnerability is exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching authorization interceptors or handlers with a non-canonical path string. While upgrading is the most secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy hardening.
Statistics
- 4 Posts
Last activity: 16 hours ago
Overview
- Go standard library
- crypto/x509
- crypto/x509
08 Apr 2026
Published
08 Apr 2026
Updated
CVSS
Pending
EPSS
0.02%
KEV
Description
During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions.Intermediates, which can lead to a denial of service. This affects both direct users of crypto/x509 and users of crypto/tls.
Statistics
- 6 Posts
Last activity: 16 hours ago
Bluesky
This addresses the following vulnerabilities: CVE-2026-39883 CVE-2026-34986 CVE-2026-33186 CVE-2026-32283 CVE-2026-32281 CVE-2026-32280 CVE-2026-29181 CVE-2026-27144 CVE-2026-27143 CVE-2026-27140 CVE-2026-25679 N/A Security fixes for apigee-watcher
Overview
- Go toolchain
- cmd/go
- cmd/go
29 Jul 2025
Published
04 Nov 2025
Updated
CVSS
Pending
EPSS
0.01%
KEV
Description
The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via "go get", are not affected.
Statistics
- 2 Posts
Last activity: 16 hours ago
Overview
- Go standard library
- database/sql
- database/sql
07 Aug 2025
Published
04 Nov 2025
Updated
CVSS
Pending
EPSS
0.02%
KEV
Description
Cancelling a query (e.g. by cancelling the context passed to one of the query methods) during a call to the Scan method of the returned Rows can result in unexpected results if other queries are being made in parallel. This can result in a race condition that may overwrite the expected results with those of another query, causing the call to Scan to return either unexpected results from the other query or an error.
Statistics
- 2 Posts
Last activity: 16 hours ago
Overview
- Go toolchain
- cmd/cgo
- cmd/cgo
05 Feb 2026
Published
05 Feb 2026
Updated
CVSS
Pending
EPSS
0.01%
KEV
Description
A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.
Statistics
- 2 Posts
Last activity: 16 hours ago