Skip to content

CVE-2025-68121 – Critical crypto/tls vulnerability in Go stdlib v1.25.4 (CVSS 10.0) #1372

@MrFix93

Description

@MrFix93

The current OpenTelemetry Collector release artifacts appear to be built against Go stdlib v1.25.4, which is affected by CVE-2025-68121 (CVSS 10.0 – CRITICAL).

This vulnerability impacts crypto/tls during session resumption and may allow a resumed TLS handshake to succeed when it should fail, if ClientCAs or RootCAs are mutated between the initial and resumed handshake.

See the details provided by our Trivy scanner:

{
          "VulnerabilityID": "CVE-2025-68121",
          "PkgID": "stdlib@v1.25.4",
          "PkgName": "stdlib",
          "PkgIdentifier": {
            "PURL": "pkg:golang/stdlib@v1.25.4",
            "UID": "cac190028f7c30e8"
          },
          "InstalledVersion": "v1.25.4",
          "FixedVersion": "1.24.13, 1.25.7, 1.26.0-rc.3",
          "Status": "fixed",
          "Layer": {
            "DiffID": "sha256:92685b7f1f7253fa098a7226c82eaedb3a30cd69969545e02c536da574a73969"
          },
          "SeveritySource": "nvd",
          "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2025-68121",
          "DataSource": {
            "ID": "govulndb",
            "Name": "The Go Vulnerability Database",
            "URL": "https://pkg.go.dev/vuln/"
          },
          "Fingerprint": "sha256:9b2b24b2a998b692b5e52da69d0554da2129afe6b145bd076b0035291a4966c7",
          "Title": "During session resumption in crypto/tls, if the underlying Config has  ...",
          "Description": "During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.",
          "Severity": "CRITICAL",
          "CweIDs": [
            "CWE-295"
          ],
          "VendorSeverity": {
            "amazon": 3,
            "bitnami": 4,
            "nvd": 4
          },
          "CVSS": {
            "bitnami": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
              "V3Score": 10
            },
            "nvd": {
              "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
              "V3Score": 10
            }
          },
          "References": [
            "https://go.dev/cl/737700",
            "https://go.dev/issue/77217",
            "https://groups.google.com/g/golang-announce/c/K09ubi9FQFk",
            "https://nvd.nist.gov/vuln/detail/CVE-2025-68121",
            "https://pkg.go.dev/vuln/GO-2026-4337"
          ],
          "PublishedDate": "2026-02-05T18:16:10.857Z",
          "LastModifiedDate": "2026-02-10T16:08:03.303Z"
        }

Could you please confirm whether the current release is indeed built with Go 1.25.4, and if so, whether an upgrade to a patched Go version (≥ 1.25.7) is planned?

Given the critical severity (CVSS 10.0), it would be helpful to understand if this will be addressed in an upcoming release.

Pinned by mx-psi

Metadata

Metadata

Assignees

No one assigned

    Labels

    area:securitySecurity and integrity issues

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions