Описание
Security update for go1.26
This update for go1.26 fixes the following issues:
Update to go1.26.1 (bsc#1255111):
- CVE-2026-25679: net/url: reject IPv6 literal not at start of host (bsc#1259264).
- CVE-2026-27137: crypto/x509: incorrect enforcement of email constraints (bsc#1259266).
- CVE-2026-27138: crypto/x509: panic in name constraint checking for malformed certificates (bsc#1259267).
- CVE-2026-27139: os: FileInfo can escape from a Root (bsc#1259268).
- CVE-2026-27142: html/template: URLs in meta content attribute actions are not escaped (bsc#1259265).
Changelog:
- go#77252 cmd/compile: miscompile of global array initialization
- go#77407 os: Go 1.25.x regression on RemoveAll for windows
- go#77474 cmd/go: CGO compilation fails after upgrading from Go 1.25.5 to 1.25.6 due to --define-variable flag in pkg-config
- go#77529 cmd/fix, x/tools/go/analysis/passes/modernize: stringscut: OOB panic in indexArgValid analyzing 'buf.Bytes()' call
- go#77532 net/smtp: expiry date of localhostCert for testing is too short
- go#77536 cmd/compile: internal compiler error: 'main.func1': not lowered: v15, Load STRUCT PTR SSA
- go#77618 strings: HasSuffix doesn't work correctly for multibyte runes in go 1.26
- go#77623 cmd/compile: internal compiler error on : 'tried to free an already free register' with generic function and type >= 192 bytes
- go#77624 cmd/fix, x/tools/go/analysis/passes/modernize: stringsbuilder breaks code when combining two strings.Builders
- go#77680 cmd/link: TestFlagW/-w_-linkmode=external fails on illumos
- go#77766 cmd/fix,x/tools/go/analysis/passes/modernize: rangeint uses target platform's type in the range expression, breaking other platforms
- go#77780 reflect: breaking change for reflect.Value.Interface behaviour
- go#77786 cmd/compile: rewriteFixedLoad does not properly sign extend AuxInt
- go#77803 cmd/fix,x/tools/go/analysis/passes/modernize: reflect.TypeOf(nil) transformed into reflect.TypeForuntyped nil
- go#77804 cmd/fix,x/tools/go/analysis/passes/modernize: minmax breaks select statements
- go#77805 cmd/fix, x/tools/go/analysis/passes/modernize: waitgroup leads to a compilation error
- go#77807 cmd/fix,x/tools/go/analysis/passes/modernize: stringsbuilder ignores variables if they are used multiple times
- go#77849 cmd/fix,x/tools/go/analysis/passes/modernize: stringscut rewrite changes behavior
- go#77860 cmd/go: change go mod init default go directive back to 1.N
- go#77899 cmd/fix, x/tools/go/analysis/passes/modernize: bad rangeint rewriting
- go#77904 x/tools/go/analysis/passes/modernize: stringsbuilder breaks code when GenDecl is a block declaration
Список пакетов
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS
SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS
SUSE Linux Enterprise Module for Development Tools 15 SP7
SUSE Linux Enterprise Server 15 SP4-LTSS
SUSE Linux Enterprise Server 15 SP5-LTSS
SUSE Linux Enterprise Server 15 SP6-LTSS
SUSE Linux Enterprise Server for SAP Applications 15 SP4
SUSE Linux Enterprise Server for SAP Applications 15 SP5
SUSE Linux Enterprise Server for SAP Applications 15 SP6
openSUSE Leap 15.6
Ссылки
- Link for SUSE-SU-2026:0876-1
- E-Mail link for SUSE-SU-2026:0876-1
- SUSE Security Ratings
- SUSE Bug 1255111
- SUSE Bug 1259264
- SUSE Bug 1259265
- SUSE Bug 1259266
- SUSE Bug 1259267
- SUSE Bug 1259268
- SUSE CVE CVE-2026-25679 page
- SUSE CVE CVE-2026-27137 page
- SUSE CVE CVE-2026-27138 page
- SUSE CVE CVE-2026-27139 page
- SUSE CVE CVE-2026-27142 page
Описание
url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.
Затронутые продукты
Ссылки
- CVE-2026-25679
- SUSE Bug 1259264
Описание
When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
Затронутые продукты
Ссылки
- CVE-2026-27137
- SUSE Bug 1259266
Описание
Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS.
Затронутые продукты
Ссылки
- CVE-2026-27138
- SUSE Bug 1259267
Описание
On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.
Затронутые продукты
Ссылки
- CVE-2026-27139
- SUSE Bug 1259268
Описание
Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value "refresh". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow "url=" by setting htmlmetacontenturlescape=0.
Затронутые продукты
Ссылки
- CVE-2026-27142
- SUSE Bug 1259265