<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2026-0013</id>
    <title>An update for golang is now available for HCE 2.0</title>
    <severity>Important</severity>
    <release>HCE 2.0</release>
    <issued date="2026-03-02 12:00:43"/>
    <updated date="2026-03-02 12:00:43"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729" id="CVE-2025-61729" title="CVE-2025-61729 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187" id="CVE-2025-58187" title="CVE-2025-58187 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-58185" id="CVE-2025-58185" title="CVE-2025-58185 Base Score: 5.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-58189" id="CVE-2025-58189" title="CVE-2025-58189 Base Score: 5.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" type="cve"/>
    </references>
    <description>Security Fix(es):

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption. (CVE-2025-61729)

Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains. (CVE-2025-58187)

Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion. (CVE-2025-58185)

When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped. (CVE-2025-58189)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="golang">
        <name>HCE 2.0</name>
        <package arch="x86_64" name="golang" version="1.17.3" release="1.r44.hce2">
          <filename>golang-1.17.3-1.r44.hce2.x86_64.rpm</filename>
        </package>
        <package arch="noarch" name="golang-devel" version="1.17.3" release="1.r44.hce2">
          <filename>golang-devel-1.17.3-1.r44.hce2.noarch.rpm</filename>
        </package>
        <package arch="noarch" name="golang-help" version="1.17.3" release="1.r44.hce2">
          <filename>golang-help-1.17.3-1.r44.hce2.noarch.rpm</filename>
        </package>
        <package arch="aarch64" name="golang" version="1.17.3" release="1.r44.hce2">
          <filename>golang-1.17.3-1.r44.hce2.aarch64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
