x509

  1. Go crypto x509 DSA DoS CVE-2025-58188: Patch and Mitigations

    A high-severity bug in the Go standard library — tracked as CVE-2025-58188 — can cause programs to panic during X.509 certificate validation when a certificate chain contains a DSA public key, enabling an attacker to induce denial-of-service conditions against any application that validates...
  2. Go Crypto x509 CVE-2025-61727 Wildcard SAN Exclusion Bug Fixed

    An important validation bug has been published against the Go standard library’s certificate-handling code: CVE-2025-61727 describes an improper application of excluded DNS name constraints when verifying wildcard names in crypto/x509, meaning that an excluded-subdomain constraint in a...
  3. Strong Certificate Mappings on Windows DCs: Prepare for Sept 2025 Deadline

    Microsoft will remove support for the StrongCertificateBindingEnforcement registry key on Windows domain controllers on September 10, 2025, forcing a permanent switch to stricter, strong certificate-to-account mappings that will break legacy certificate-based authentication setups unless...