Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Go 1.25.6 and 1.24.12 Patch Critical Vulnerabilities Lead to DoS and Memory Exhaustion Risks

Go 1.25.6 and 1.24.12 Patch Critical Vulnerabilities Lead to DoS and Memory Exhaustion Risks

Posted on January 16, 2026January 16, 2026 By CWS

The Go programming language workforce has rolled out emergency level releases, Go 1.25.6 and 1.24.12, to handle six high-impact safety flaws.

These updates repair denial-of-service (DoS) vectors, arbitrary code execution dangers, and TLS mishandlings that might expose builders to distant assaults.

Whereas not branded as model 1.26, the patches urge fast upgrades for initiatives counting on Go’s customary library, particularly in net servers, crypto instruments, and construct methods.

Introduced through official channels, the releases comply with Go’s strict safety coverage, crediting exterior researchers for disclosures.

Binary downloads can be found at go.dev/dl, with full notes at go.dev/doc/devel/launch#go1.25.6. Attackers may exploit these in unpatched environments, from ZIP parsers to TLS handshakes.

Key Vulnerabilities and Exploit Paths

Among the many fixes, web/http’s Request.ParseForm stands out for reminiscence exhaustion. Malicious URL-encoded kinds with extreme key-value pairs set off outsized allocations, crippling servers underneath load. Equally, archive/zip’s super-linear filename indexing invitations DoS through crafted archives.

Extra extreme are cmd/go flaws enabling code execution. CgoPkgConfig bypassed flag sanitization, working pkg-config with unsafe inputs. Toolchain VCS dealing with (Git/Mercurial) allowed malicious module variations or domains to execute code or overwrite recordsdata triggerable through customized go get paths, although not @newest.

TLS points compound dangers: Config.Clone leaked auto-generated session ticket keys, enabling unauthorized resumptions throughout configs.

Session checks ignored full certificates chain expirations, and handshake messages processed on the unsuitable encryption ranges risked data leaks from injected packets.

CVE IDComponentDescription SummaryGo Problem LinkReporterCVE-2025-61728archive/zipSuper-linear filename indexing causes DoS on malicious ZIPsgo.dev/concern/77102Jakub CiolekCVE-2025-61726net/httpMemory exhaustion from extreme type key-value pairsgo.dev/concern/77101jub0bsCVE-2025-68121crypto/tlsConfig.Clone leaks session keys; ignores full cert chain expirationgo.dev/concern/77113Coia Prant (rbqvq)CVE-2025-61731cmd/goCgoPkgConfig flag bypass results in arbitrary code executiongo.dev/concern/77100RyotaK (GMO Flatt Safety)CVE-2025-68119cmd/goVCS toolchain misinterpretation allows code exec/file writesgo.dev/concern/77099splitline (DEVCORE)CVE-2025-61730crypto/tlsHandshake messages processed at incorrect encryption stage (data disclosure)go.dev/concern/76443Coia Prant (rbqvq)

Improve and Mitigation Recommendation

Builders ought to pin to 1.25.6 or 1.24.12 instantly, rebuilding binaries through git checkout go1.25.6. Scan dependencies for susceptible modules.

No CVSS scores are printed but, however DoS and RCE potentials fee excessive. Go’s proactive patching underscores supply-chain hygiene in 2026’s menace panorama.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:1.24.12, 1.25.6, Critical, DoS, Exhaustion, Lead, Memory, Patch, Risks, Vulnerabilities

Post navigation

Previous Post: New AWS Console Supply Chain Attack Lets Attackers Hijack AWS GitHub Repositories
Next Post: China-Linked APT Exploits Sitecore Zero-Day in Attacks on American Critical Infrastructure

Related Posts

SonicWall Confirms State-Sponsored Hackers Behind the Massive Firewall Backup Breach SonicWall Confirms State-Sponsored Hackers Behind the Massive Firewall Backup Breach Cyber Security News
New Malware Spotted in The Wild Using Prompt Injection to Manipulate AI Models Processing Sample New Malware Spotted in The Wild Using Prompt Injection to Manipulate AI Models Processing Sample Cyber Security News
Windows Admin Center Vulnerability (CVE-2025-64669) Let Attackers Escalate Privileges Windows Admin Center Vulnerability (CVE-2025-64669) Let Attackers Escalate Privileges Cyber Security News
Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS, CI/CD and macOS Data Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS, CI/CD and macOS Data Cyber Security News
University of Phoenix Data Breach University of Phoenix Data Breach Cyber Security News
Hackers Stolen Over 0 million by Exploiting Balancer DeFi protocol Hackers Stolen Over $100 million by Exploiting Balancer DeFi protocol Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News