Critical Go Vulnerabilities Patched in 1.25.6 and 1.24.12 Releases

Related

Emerging ZeroDayRAT Spyware Threatens Android and iOS Devices

What happened Security researchers have identified a new mobile spyware...

CISOs & Cybersecurity Leaders to Watch in Italy’s Telecommunications Industry

Italy’s telecommunications sector forms the backbone of national connectivity,...

CISOs to Watch in Italy’s Hospitals & Healthcare Industry

Italy’s healthcare ecosystem is under constant pressure: round-the-clock clinical...

CISOs & Cybersecurity Leaders to Watch in Italy’s Automotive Industry

Italy’s automotive industry stands at the intersection of manufacturing...

Share

What happened

The Go programming language team released emergency updates Go 1.25.6 and Go 1.24.12 to patch six high-impact security vulnerabilities affecting the standard library and toolchain. External researchers credited for these discoveries include Jakub Ciolek, jub0bs, Coia Prant (rbqvq), RyotaK (GMO Flatt Security), and splitline (DEVCORE). Vulnerabilities included memory exhaustion in net/http’s Request.ParseForm, super-linear filename indexing in archive/zip leading to DoS, unsafe CgoPkgConfig execution enabling arbitrary code, VCS toolchain misinterpretation allowing file overwrites, and TLS session handling flaws exposing session ticket keys. Exploitation could affect web servers, cryptographic tools, and build systems using Go modules, potentially leading to denial-of-service or code execution on unpatched environments.

Who is affected

Developers and enterprises relying on Go 1.24.x or 1.25.x in production systems, including web servers, cryptography tools, and CI/CD pipelines, are directly affected. Any applications built on these versions without the latest patches face potential DoS or remote code execution risks.

Why CISOs should care

Unpatched language runtime vulnerabilities pose supply chain and operational risks. Exploitation could compromise enterprise applications, disrupt services, and enable injection of malicious code into downstream builds.

3 practical actions

  • Upgrade Go immediately: Update to Go 1.25.6 or Go 1.24.12 and rebuild binaries to mitigate DoS and code execution risks.
  • Audit dependencies and builds: Scan all Go modules and CI/CD pipelines for unpatched or vulnerable versions.
  • Monitor runtime behavior: Watch for excessive memory allocations, abnormal archive processing, or suspicious TLS handshake anomalies.