Critical Go Vulnerabilities Patched in 1.25.6 and 1.24.12 Releases

Related

In Praise of CISA

Lately, the Cybersecurity and Infrastructure Security Agency (CISA) has...

Cybersecurity Leaders to Watch: Louisiana Healthcare

Louisiana’s healthcare sector depends on cybersecurity leaders who can...

Anthropic Unveils Claude Mythos to Find Critical Software Flaws Before Attackers Do

What happened Anthropic unveiled Claude Mythos Preview as the model...

Microsoft Commits $10 Billion to Expand AI and Cybersecurity Infrastructure in Japan

What happened Microsoft announced a $10 billion investment to expand...

Share

What happened

The Go programming language team released emergency updates Go 1.25.6 and Go 1.24.12 to patch six high-impact security vulnerabilities affecting the standard library and toolchain. External researchers credited for these discoveries include Jakub Ciolek, jub0bs, Coia Prant (rbqvq), RyotaK (GMO Flatt Security), and splitline (DEVCORE). Vulnerabilities included memory exhaustion in net/http’s Request.ParseForm, super-linear filename indexing in archive/zip leading to DoS, unsafe CgoPkgConfig execution enabling arbitrary code, VCS toolchain misinterpretation allowing file overwrites, and TLS session handling flaws exposing session ticket keys. Exploitation could affect web servers, cryptographic tools, and build systems using Go modules, potentially leading to denial-of-service or code execution on unpatched environments.

Who is affected

Developers and enterprises relying on Go 1.24.x or 1.25.x in production systems, including web servers, cryptography tools, and CI/CD pipelines, are directly affected. Any applications built on these versions without the latest patches face potential DoS or remote code execution risks.

Why CISOs should care

Unpatched language runtime vulnerabilities pose supply chain and operational risks. Exploitation could compromise enterprise applications, disrupt services, and enable injection of malicious code into downstream builds.

3 practical actions

  • Upgrade Go immediately: Update to Go 1.25.6 or Go 1.24.12 and rebuild binaries to mitigate DoS and code execution risks.
  • Audit dependencies and builds: Scan all Go modules and CI/CD pipelines for unpatched or vulnerable versions.
  • Monitor runtime behavior: Watch for excessive memory allocations, abnormal archive processing, or suspicious TLS handshake anomalies.