Описание
Security update for go1.25
This update for go1.25 fixes the following issues:
Update to go1.25.8 (bsc#1244485):
- CVE-2026-25679: net/url: reject IPv6 literal not at start of host (bsc#1259264).
- CVE-2026-27139: os: FileInfo can escape from a Root (bsc#1259268).
- CVE-2026-27142: html/template: URLs in meta content attribute actions are not escaped (bsc#1259265).
Changelog:
- go#77253 cmd/compile: miscompile of global array initialization
- go#77406 os: Go 1.25.x regression on RemoveAll for windows
- go#77413 runtime: netpollinit() incorrectly prints the error from linux.Eventfd
- go#77438 cmd/go: CGO compilation fails after upgrading from Go 1.25.5 to 1.25.6 due to --define-variable flag in pkg-config
- go#77531 net/smtp: expiry date of localhostCert for testing is too short
Список пакетов
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS
SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS
SUSE Linux Enterprise Module for Development Tools 15 SP7
SUSE Linux Enterprise Server 15 SP4-LTSS
SUSE Linux Enterprise Server 15 SP5-LTSS
SUSE Linux Enterprise Server 15 SP6-LTSS
SUSE Linux Enterprise Server for SAP Applications 15 SP4
SUSE Linux Enterprise Server for SAP Applications 15 SP5
SUSE Linux Enterprise Server for SAP Applications 15 SP6
openSUSE Leap 15.6
Ссылки
- Link for SUSE-SU-2026:0875-1
- E-Mail link for SUSE-SU-2026:0875-1
- SUSE Security Ratings
- SUSE Bug 1244485
- SUSE Bug 1259264
- SUSE Bug 1259265
- SUSE Bug 1259268
- SUSE CVE CVE-2026-25679 page
- SUSE CVE CVE-2026-27139 page
- SUSE CVE CVE-2026-27142 page
Описание
url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.
Затронутые продукты
Ссылки
- CVE-2026-25679
- SUSE Bug 1259264
Описание
On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.
Затронутые продукты
Ссылки
- CVE-2026-27139
- SUSE Bug 1259268
Описание
Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value "refresh". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow "url=" by setting htmlmetacontenturlescape=0.
Затронутые продукты
Ссылки
- CVE-2026-27142
- SUSE Bug 1259265