Skip to content

Renovate: Update go toolchain directive to v1.26.3 [SECURITY]#152

Open
renovate[bot] wants to merge 1 commit into
mainfrom
renovate/golang-version-go-vulnerability
Open

Renovate: Update go toolchain directive to v1.26.3 [SECURITY]#152
renovate[bot] wants to merge 1 commit into
mainfrom
renovate/golang-version-go-vulnerability

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented May 14, 2026

This PR contains the following updates:

Package Type Update Change
go (source) toolchain patch 1.26.01.26.3

Incorrect enforcement of email constraints in crypto/x509

BIT-golang-2026-27137 / CVE-2026-27137 / GO-2026-4599

More information

Details

When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Panic in name constraint checking for malformed certificates in crypto/x509

BIT-golang-2026-27138 / CVE-2026-27138 / GO-2026-4600

More information

Details

Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Incorrect parsing of IPv6 host literals in net/url

BIT-golang-2026-25679 / CVE-2026-25679 / GO-2026-4601

More information

Details

url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


FileInfo can escape from a Root in os

BIT-golang-2026-27139 / CVE-2026-27139 / GO-2026-4602

More information

Details

On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened.

The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


URLs in meta content attribute actions are not escaped in html/template

BIT-golang-2026-27142 / CVE-2026-27142 / GO-2026-4603

More information

Details

Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value "refresh".

A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow "url=" by setting htmlmetacontenturlescape=0.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


TOCTOU permits root escape on Linux via Root.Chmod in os in internal/syscall/unix

BIT-golang-2026-32282 / CVE-2026-32282 / GO-2026-4864

More information

Details

On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root.

The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target is a symlink lying outside the root, so the impact is limited to cases where the target is replaced with a symlink between the check and operation.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


JsBraceDepth Context Tracking Bugs (XSS) in html/template

BIT-golang-2026-32289 / CVE-2026-32289 / GO-2026-4865

More information

Details

Context was not properly tracked across template branches for JS template literals, leading to possibly incorrect escaping of content when branches were used. Additionally template actions within JS template literals did not properly track the brace depth, leading to incorrect escaping being applied.

These issues could cause actions within JS template literals to be incorrectly or improperly escaped, leading to XSS vulnerabilities.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509

BIT-golang-2026-33810 / CVE-2026-33810 / GO-2026-4866

More information

Details

When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint.

This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Unbounded allocation for old GNU sparse in archive/tar

BIT-golang-2026-32288 / CVE-2026-32288 / GO-2026-4869

More information

Details

tar.Reader can allocate an unbounded amount of memory when reading a maliciously-crafted archive containing a large number of sparse regions encoded in the "old GNU sparse map" format.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Unauthenticated TLS 1.3 KeyUpdate record can cause persistent connection retention and DoS in crypto/tls

BIT-golang-2026-32283 / CVE-2026-32283 / GO-2026-4870

More information

Details

If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service.

This only affects TLS 1.3.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Inefficient policy validation in crypto/x509

BIT-golang-2026-32281 / CVE-2026-32281 / GO-2026-4946

More information

Details

Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service.

This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Unexpected work during chain building in crypto/x509

BIT-golang-2026-32280 / CVE-2026-32280 / GO-2026-4947

More information

Details

During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions.Intermediates, which can lead to a denial of service. This affects both direct users of crypto/x509 and users of crypto/tls.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Infinite loop in HTTP/2 transport when given bad SETTINGS_MAX_FRAME_SIZE in net/http/internal/http2 in golang.org/x/net

BIT-golang-2026-33814 / CVE-2026-33814 / GO-2026-4918

More information

Details

When processing HTTP/2 SETTINGS frames, transport will enter an infinite loop of writing CONTINUATION frames if it receives a SETTINGS_MAX_FRAME_SIZE with a value of 0.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Panic in Dial and LookupPort when handling NUL byte on Windows in net

BIT-golang-2026-39836 / CVE-2026-39836 / GO-2026-4971

More information

Details

The Dial and LookupPort functions panic on Windows when provided with an input containing a NUL (0).

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


ReverseProxy forwards queries with more than urlmaxqueryparams parameters in net/http/httputil

BIT-golang-2026-39825 / CVE-2026-39825 / GO-2026-4976

More information

Details

ReverseProxy can forward queries containing parameters not visible to Rewrite functions.

When used with a Rewrite function, or a Director function which parses query parameters, ReverseProxy sanitizes the forwarded request to remove query parameters which are not parsed by url.ParseQuery. ReverseProxy does not take ParseQuery's limit on the total number of query parameters (controlled by GODEBUG=urlmaxqueryparams=N) into account. This can permit ReverseProxy to forward a request containing a query parameter that is not visible to the Rewrite function.

For example, the query "a1=x&a2=x&...&a10000=x&hidden=y" can forward the parameter "hidden=y" while hiding it from the proxy's Rewrite function.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Quadratic string concatenation in consumePhrase in net/mail

BIT-golang-2026-42499 / CVE-2026-42499 / GO-2026-4977

More information

Details

Pathological inputs could cause DoS through consumePhrase when parsing an email address according to RFC 5322.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Escaper bypass leads to XSS in html/template

BIT-golang-2026-39826 / CVE-2026-39826 / GO-2026-4980

More information

Details

If a trusted template author were to write a <script> tag containing an empty 'type' attribute or a 'type' attribute with an ASCII whitespace, the execution of the template would incorrectly escape any data passed into the <script> block.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Crash when handling long CNAME response in net

BIT-golang-2026-33811 / CVE-2026-33811 / GO-2026-4981

More information

Details

When using LookupCNAME with the cgo DNS resolver, a very long CNAME response can trigger a double-free of C memory and a crash.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Bypass of meta content URL escaping causes XSS in html/template

BIT-golang-2026-39823 / CVE-2026-39823 / GO-2026-4982

More information

Details

CVE-2026-27142 fixed a vulnerability in which URLs were not correctly escaped inside of a tag's attribute. If the URL content were to insert ASCII whitespaces around the '=' rune inside of the attribute, the escaper would fail to similarly escape it, leading to XSS.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Quadratic string concatentation in consumeComment in net/mail

BIT-golang-2026-39820 / CVE-2026-39820 / GO-2026-4986

More information

Details

Well-crafted inputs reaching ParseAddress, ParseAddressList, and ParseDate were able to trigger excessive CPU exhaustion and memory allocations.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Release Notes

golang/go (go)

v1.26.3

v1.26.2

v1.26.1


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants