data/reports: add GO-2026-4441 - data/reports/GO-2026-4441.yaml Updates golang/vulndb#4441 Change-Id: Icad880a9a935b2e304a39fabb2648c9838d8f707 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/742422 Auto-Submit: Roland Shoemaker <roland@golang.org> LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com> Reviewed-by: Neal Patel <nealpatel@google.com>
diff --git a/data/cve/v5/GO-2026-4441.json b/data/cve/v5/GO-2026-4441.json new file mode 100644 index 0000000..0b1ea06 --- /dev/null +++ b/data/cve/v5/GO-2026-4441.json
@@ -0,0 +1,85 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.0", + "cveMetadata": { + "cveId": "CVE-2025-58190" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc" + }, + "title": "Infinite parsing loop in golang.org/x/net", + "descriptions": [ + { + "lang": "en", + "value": "The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content." + } + ], + "affected": [ + { + "vendor": "golang.org/x/net", + "product": "golang.org/x/net/html", + "collectionURL": "https://pkg.go.dev", + "packageName": "golang.org/x/net/html", + "versions": [ + { + "version": "0", + "lessThan": "0.45.0", + "status": "affected", + "versionType": "semver" + } + ], + "programRoutines": [ + { + "name": "inRowIM" + }, + { + "name": "Parse" + }, + { + "name": "ParseFragment" + }, + { + "name": "ParseFragmentWithOptions" + }, + { + "name": "ParseWithOptions" + } + ], + "defaultStatus": "unaffected" + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "lang": "en", + "description": "CWE-835: Loop with Unreachable Exit Condition" + } + ] + } + ], + "references": [ + { + "url": "https://groups.google.com/g/golang-announce/c/jnQcOYpiR2c" + }, + { + "url": "https://github.com/golang/vulndb/issues/4441" + }, + { + "url": "https://go.dev/cl/709875" + }, + { + "url": "https://pkg.go.dev/vuln/GO-2026-4441" + } + ], + "credits": [ + { + "lang": "en", + "value": "Guido Vranken" + } + ] + } + } +} \ No newline at end of file
diff --git a/data/osv/GO-2026-4441.json b/data/osv/GO-2026-4441.json new file mode 100644 index 0000000..c2f4186 --- /dev/null +++ b/data/osv/GO-2026-4441.json
@@ -0,0 +1,69 @@ +{ + "schema_version": "1.3.1", + "id": "GO-2026-4441", + "modified": "0001-01-01T00:00:00Z", + "published": "0001-01-01T00:00:00Z", + "aliases": [ + "CVE-2025-58190" + ], + "summary": "Infinite parsing loop in golang.org/x/net", + "details": "The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.", + "affected": [ + { + "package": { + "name": "golang.org/x/net", + "ecosystem": "Go" + }, + "ranges": [ + { + "type": "SEMVER", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "0.45.0" + } + ] + } + ], + "ecosystem_specific": { + "imports": [ + { + "path": "golang.org/x/net/html", + "symbols": [ + "Parse", + "ParseFragment", + "ParseFragmentWithOptions", + "ParseWithOptions", + "inRowIM" + ] + } + ] + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://groups.google.com/g/golang-announce/c/jnQcOYpiR2c" + }, + { + "type": "REPORT", + "url": "https://github.com/golang/vulndb/issues/4441" + }, + { + "type": "FIX", + "url": "https://go.dev/cl/709875" + } + ], + "credits": [ + { + "name": "Guido Vranken" + } + ], + "database_specific": { + "url": "https://pkg.go.dev/vuln/GO-2026-4441", + "review_status": "REVIEWED" + } +} \ No newline at end of file
diff --git a/data/reports/GO-2026-4441.yaml b/data/reports/GO-2026-4441.yaml new file mode 100644 index 0000000..2ea5a25 --- /dev/null +++ b/data/reports/GO-2026-4441.yaml
@@ -0,0 +1,33 @@ +id: GO-2026-4441 +modules: + - module: golang.org/x/net + versions: + - fixed: 0.45.0 + vulnerable_at: 0.44.0 + packages: + - package: golang.org/x/net/html + symbols: + - inRowIM + derived_symbols: + - Parse + - ParseFragment + - ParseFragmentWithOptions + - ParseWithOptions +summary: Infinite parsing loop in golang.org/x/net +description: |- + The html.Parse function in golang.org/x/net/html has an infinite parsing loop + when processing certain inputs, which can lead to denial of service (DoS) if an + attacker provides specially crafted HTML content. +credits: + - Guido Vranken +references: + - web: https://groups.google.com/g/golang-announce/c/jnQcOYpiR2c + - report: https://github.com/golang/vulndb/issues/4441 + - fix: https://go.dev/cl/709875 +cve_metadata: + id: CVE-2025-58190 + cwe: 'CWE-835: Loop with Unreachable Exit Condition' +source: + id: go-security-team + created: 2026-02-05T08:30:52.058191-08:00 +review_status: REVIEWED