CVE-2025-58186

Published: October 9, 2025Last modified: December 23, 2025

Description

Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.

Severity score breakdown

ParameterValue
Base score5.3
Attack VectorNETWORK
Attack complexityLOW
Privileges requiredNONE
User interactionNONE
ScopeUNCHANGED
ConfidentialityNONE
Integrity impactNONE
Availability impactLOW
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSgoFixed (1.24.8-r0)
25 LTSgoFixed (1.24.8-r0)
StreamgoFixed (1.25.2-r0)
Hardened Containers23 LTSgoFixed (1.24.8-r0)
25 LTSgoFixed (1.24.8-r0)
StreamgoFixed (1.25.2-r0)

References

ON THIS PAGE