Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.
An algorithm in a product has an inefficient worst-case computational complexity that may be detrimental to system performance and can be triggered by an attacker, typically using crafted manipulations that ensure that the worst case is being reached.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Go | Golang | * | 1.24.9 (excluding) |
| Go | Golang | 1.25.0 (including) | 1.25.3 (excluding) |
| Golang-1.23 | Ubuntu | plucky | * |
| Golang-1.24 | Ubuntu | plucky | * |