A new security advisory affecting the Go standard library's crypto/x509 package — tracked as CVE-2026-27138 — warns that certificate chain verification can panic when an intermediate or leaf certificate contains an empty DNS name while another certificate in the same chain includes excluded name...
A subtle correctness bug in Go’s X.509 verification code — tracked as CVE-2026-27137 — can cause certificate chains to ignore multiple email-address name constraints when those constraints share the same local-part but differ by domain. The practical upshot: under specific conditions a...