Excessive CPU Consumption in Golang's Response Handling
CVE-2025-61724
What is CVE-2025-61724?
The Reader.ReadResponse function in the Golang Standard Library exhibits a vulnerability due to inefficient string concatenation. This occurs when processing a response with a large number of lines, leading to excessive CPU consumption as the system struggles to handle the demand. As more lines are added, the performance degradation intensifies, posing risks for applications relying on this function, particularly under heavy loads. Developers should review their implementations and optimize response handling to mitigate potential impacts.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
net/textproto 0 < 1.24.8
net/textproto 1.25.0 < 1.25.2
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
