Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Go standard library — Vulnerabilities & Security Advisories 107

Browse all 107 CVE security advisories affecting Go standard library. AI-powered Chinese analysis, POCs, and references for each vulnerability.

The Go standard library provides essential built-in packages for networking, cryptography, and system interaction, serving as the foundational runtime for millions of applications. Despite its robust design, it has recorded approximately 100 Common Vulnerabilities and Exposures (CVEs), primarily stemming from logic errors in parsing or concurrency handling rather than complex exploitation chains. Historically, common vulnerability classes include denial-of-service conditions via malformed input, race conditions in concurrent data structures, and occasional remote code execution flaws within specific subsystems like HTTP servers or crypto implementations. Notable incidents often involve improper validation leading to memory corruption or information disclosure. While the library is generally secure, its widespread adoption means even minor flaws can impact a vast ecosystem. Developers must remain vigilant about patching updates, as the standard library’s central role amplifies the risk of any discovered defect affecting dependent software infrastructure.

Found 13 results / 107Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2026-32280 Unexpected work during chain building in crypto/x509 — crypto/x509 7.5AIHighAI2026-04-08
CVE-2026-32281 Inefficient policy validation in crypto/x509 — crypto/x509 7.5AIHighAI2026-04-08
CVE-2026-33810 Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509 — crypto/x509 6.5AIMediumAI2026-04-08
CVE-2026-27138 Panic in name constraint checking for malformed certificates in crypto/x509 — crypto/x509 7.5 -2026-03-06
CVE-2026-27137 Incorrect enforcement of email constraints in crypto/x509 — crypto/x509 5.3 -2026-03-06
CVE-2025-61727 Improper application of excluded DNS name constraints when verifying wildcard names in crypto/x509 — crypto/x509 9.8AICriticalAI2025-12-03
CVE-2025-61729 Excessive resource consumption when printing error string for host certificate validation in crypto/x509 — crypto/x509 7.5AIHighAI2025-12-02
CVE-2025-58188 Panic when validating certificates with DSA public keys in crypto/x509 — crypto/x509 7.5AIHighAI2025-10-29
CVE-2025-58187 Quadratic complexity when checking name constraints in crypto/x509 — crypto/x509 5.3AIMediumAI2025-10-29
CVE-2025-22874 Usage of ExtKeyUsageAny disables policy validation in crypto/x509 — crypto/x509 6.5AIMediumAI2025-06-11
CVE-2025-22865 ParsePKCS1PrivateKey panic with partial keys in crypto/x509 — crypto/x509 7.5 -2025-01-28
CVE-2024-45341 Usage of IPv6 zone IDs can bypass URI name constraints in crypto/x509 — crypto/x509 5.3 -2025-01-28
CVE-2024-24783 Verify panics on certificates with an unknown public key algorithm in crypto/x509 — crypto/x509 7.5AIHighAI2024-03-05

This page lists every published CVE security advisory associated with Go standard library. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.