Fix CVE-2025-61729: Upgrade Go toolchain from 1.24.6 to 1.25.5#545
Fix CVE-2025-61729: Upgrade Go toolchain from 1.24.6 to 1.25.5#545Harishma-Hari wants to merge 2 commits intokubernetes-csi:masterfrom
Conversation
- Updated toolchain version in go.mod to address crypto/x509 vulnerability - CVE-2025-61729: Excessive resource consumption in HostnameError.Error() - Severity: High (CVSS 7.5) - Fix available in Go 1.25.5
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: Harishma-Hari The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
Welcome @Harishma-Hari! |
|
Hi @Harishma-Hari. Thanks for your PR. I'm waiting for a kubernetes-csi member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
/close |
|
@jsafrane: Closed this PR. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
What type of PR is this?
/kind bug
What this PR does / why we need it:
This PR fixes CVE-2025-61729, a high-severity security vulnerability in Go's crypto/x509 package. The vulnerability causes excessive resource consumption in HostnameError.Error() due to unbounded host printing and quadratic string concatenation, which can be exploited by malicious actors providing specially crafted certificates.
The fix upgrades the Go toolchain from version 1.24.6 (vulnerable) to version 1.25.5 (patched).
Which issue(s) this PR fixes:
Fixes CVE-2025-61729
Special notes for your reviewer:
Does this PR introduce a user-facing change?: