CVE-2025-22865
Description
Using ParsePKCS1PrivateKey to parse a RSA key that is missing the CRT values would panic when verifying that the key is well formed.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
ParsePKCS1PrivateKey in Go's crypto/x509 panics on RSA private keys missing CRT values, enabling denial of service.
Vulnerability
ParsePKCS1PrivateKey in the crypto/x509 package of Go's standard library panics when parsing an RSA private key that lacks the Chinese Remainder Theorem (CRT) values. The panic occurs during key well-formedness verification, as the function assumes CRT values are present [1]. This is a logic error in the parsing routine.
Exploitation
An attacker can exploit this by providing a crafted RSA private key that is missing one or more CRT parameters (e.g., dQ, dP, qInv). The key must be in PKCS#1 format and passed to ParsePKCS1PrivateKey. No authentication or special network position is required; any service that parses user-supplied private keys (e.g., certificate management tools) is vulnerable.
Impact
Successful exploitation causes a panic (runtime crash) of the Go process, leading to denial of service (DoS). The CVSS score of 7.5 reflects the high availability impact. No code execution or data breach is reported.
Mitigation
The issue is fixed in Go 1.24 RC2 and will be included in the stable Go 1.24 release [2][3]. Users are advised to update to the latest version. Alternatively, applications can validate keys before parsing or use a wrapper that recovers from panics.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
20- osv-coords19 versionspkg:bitnami/golangpkg:rpm/opensuse/go1.24&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/go1.24&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/govulncheck-vulndb&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/govulncheck-vulndb&distro=openSUSE%20Tumbleweedpkg:rpm/suse/go1.24&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/go1.24&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/go1.24&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/go1.24&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/go1.24&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/go1.24&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/go1.24&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP6pkg:rpm/suse/go1.24&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/go1.24&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/go1.24&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/go1.24&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/go1.24&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4pkg:rpm/suse/go1.24&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5pkg:rpm/suse/govulncheck-vulndb&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP6
>= 1.24.0-0, < 1.24.0-rc.2+ 18 more
- (no CPE)range: >= 1.24.0-0, < 1.24.0-rc.2
- (no CPE)range: < 1.24rc2-150000.1.3.1
- (no CPE)range: < 1.24rc2-1.1
- (no CPE)range: < 0.0.20250128T150132-150000.1.29.1
- (no CPE)range: < 0.0.20250128T150132-1.1
- (no CPE)range: < 1.24rc2-150000.1.3.1
- (no CPE)range: < 1.24rc2-150000.1.3.1
- (no CPE)range: < 1.24rc2-150000.1.3.1
- (no CPE)range: < 1.24rc2-150000.1.3.1
- (no CPE)range: < 1.24rc2-150000.1.3.1
- (no CPE)range: < 1.24rc2-150000.1.3.1
- (no CPE)range: < 1.24rc2-150000.1.3.1
- (no CPE)range: < 1.24rc2-150000.1.3.1
- (no CPE)range: < 1.24rc2-150000.1.3.1
- (no CPE)range: < 1.24rc2-150000.1.3.1
- (no CPE)range: < 1.24rc2-150000.1.3.1
- (no CPE)range: < 1.24rc2-150000.1.3.1
- (no CPE)range: < 1.24rc2-150000.1.3.1
- (no CPE)range: < 0.0.20250128T150132-150000.1.29.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.