Skip to content

Commit 1bf670b

Browse files
committed
go: update to 1.25.8 and 1.26.1 (security)
These releases include 5 security fixes following the security policy: - crypto/x509: incorrect enforcement of email constraints When verifying a certificate chain which contains a certificate containing multiple email address constraints (composed of the full email address) which share common local portions (the portion of the address before the '@' character) but different domain portions (the portion of the address after the '@' character), these constraints will not be properly applied, and only the last constraint will be considered. This can allow certificates in the chain containing email addresses which are either not permitted or excluded by the relevant constraints to be returned by calls to Certificate.Verify. Since the name constraint checks happen after chain building is complete, this only applies to certificate chains which chain to trusted roots (root certificates either in VerifyOptions.Roots or in the system root certificate pool), requiring a trusted CA to issue certificates containing either not permitted or excluded email addresses. This issue only affects Go 1.26. Thanks to Jakub Ciolek for reporting this issue. This is CVE-2026-27137 and Go issue https://go.dev/issue/77952. - crypto/x509: panic in name constraint checking for malformed certificates Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS. Since the name constraint checks happen after chain building is complete, this only applies to certificate chains which chain to trusted roots (root certificates either in VerifyOptions.Roots or in the system root certificate pool), requiring a trusted CA to issue certificates containing malformed DNS names. This issue only affects Go 1.26. Thanks to Jakub Ciolek for reporting this issue. This is CVE-2026-27138 and Go issue https://go.dev/issue/77953. - html/template: URLs in meta content attribute actions are not escaped Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value "refresh". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow "url=" by setting htmlmetacontenturlescape=0. This is CVE-2026-27142 and Go issue https://go.dev/issue/77954. - net/url: reject IPv6 literal not at start of host The Go standard library function net/url.Parse insufficiently validated the host/authority component and accepted some invalid URLs by effectively treating garbage before an IP-literal as ignorable. The function should have rejected this as invalid. To prevent this behavior, net/url.Parse now rejects IPv6 literals that do not appear at the start of the host subcomponent of a URL. Thanks to Masaki Hara (https://github.com/qnighy) of Wantedly. This is CVE-2026-25679 and Go issue https://go.dev/issue/77578. - os: FileInfo can escape from a Root On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The contents of the FileInfo were populated using the lstat system call, which takes the path to the file as a parameter. If a component of the full path of the file described by the FileInfo is replaced with a symbolic link, the target of the lstat can be directed to another location on the filesystem. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem. This could be used to probe for the presence or absence of files as well as gleaning metadata like file sizes, but does not permit reading or writing files outside the root. The FileInfo is now populated using fstatat. Thank you to Miloslav Trmač of Red Hat for reporting this issue. This is CVE-2026-27139 and Go issue https://go.dev/issue/77827.
1 parent 9878321 commit 1bf670b

5 files changed

Lines changed: 25 additions & 15 deletions

File tree

lang/go/version.mk

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
1-
# $NetBSD: version.mk,v 1.245 2026/02/24 08:42:08 bsiegert Exp $
1+
# $NetBSD: version.mk,v 1.246 2026/03/06 20:57:33 bsiegert Exp $
22

33
#
44
# If bsd.prefs.mk is included before go-package.mk in a package, then this
55
# file must be included directly in the package prior to bsd.prefs.mk.
66
#
77
.include "go-vars.mk"
88

9-
GO126_VERSION= 1.26.0
10-
GO125_VERSION= 1.25.7
9+
GO126_VERSION= 1.26.1
10+
GO125_VERSION= 1.25.8
1111
GO124_VERSION= 1.24.13
1212
GO123_VERSION= 1.23.12
1313
GO122_VERSION= 1.22.12

lang/go125/PLIST

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
@comment $NetBSD: PLIST,v 1.4 2026/01/15 19:46:57 bsiegert Exp $
1+
@comment $NetBSD: PLIST,v 1.5 2026/03/06 20:57:33 bsiegert Exp $
22
bin/go${GOVERSSUFFIX}
33
bin/gofmt${GOVERSSUFFIX}
44
go125/CONTRIBUTING.md
@@ -7276,6 +7276,7 @@ go125/src/internal/poll/fd_windows_test.go
72767276
go125/src/internal/poll/fd_writev_libc.go
72777277
go125/src/internal/poll/fd_writev_unix.go
72787278
go125/src/internal/poll/file_plan9.go
7279+
go125/src/internal/poll/fstatat_unix.go
72797280
go125/src/internal/poll/hook_cloexec.go
72807281
go125/src/internal/poll/hook_unix.go
72817282
go125/src/internal/poll/hook_windows.go
@@ -9065,6 +9066,9 @@ go125/src/os/stat_test.go
90659066
go125/src/os/stat_unix.go
90669067
go125/src/os/stat_wasip1.go
90679068
go125/src/os/stat_windows.go
9069+
go125/src/os/statat.go
9070+
go125/src/os/statat_other.go
9071+
go125/src/os/statat_unix.go
90689072
go125/src/os/sticky_bsd.go
90699073
go125/src/os/sticky_notbsd.go
90709074
go125/src/os/sys.go

lang/go125/distinfo

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
1-
$NetBSD: distinfo,v 1.9 2026/02/06 20:23:00 bsiegert Exp $
1+
$NetBSD: distinfo,v 1.10 2026/03/06 20:57:34 bsiegert Exp $
22

33
BLAKE2s (9ba0948172cbb05308fb2a9db823a720f8ffb9ad.patch) = e1cc8b23dd53ddb2e0d034b15afda2c5f83a5103a9536fd54d717b07f5fd9628
44
SHA512 (9ba0948172cbb05308fb2a9db823a720f8ffb9ad.patch) = 0a0787b8ea302356b724c36baf0db0df4ba29e5c56a6facc7d5a86d159dd6de23817ca62c3446f7e134810b44ebd79b6758331630e2ba8b196e6b249f1871d33
55
Size (9ba0948172cbb05308fb2a9db823a720f8ffb9ad.patch) = 1661 bytes
6-
BLAKE2s (go1.25.7.src.tar.gz) = 895d738c21ca97f50b38b2903175da9a8ac3d097fee185a8fd4c8222de1f6870
7-
SHA512 (go1.25.7.src.tar.gz) = 054fdb8219d18a7942c524d8acc3c942d0a7b8f1c01b96184fa79017b6548533798f5f48cc78f7ecfb70da504c5c66569377a35d517a0e3184c32fe84c9ee0b6
8-
Size (go1.25.7.src.tar.gz) = 31990868 bytes
6+
BLAKE2s (go1.25.8.src.tar.gz) = e9882b64493cf3f5eca80739862a90e9bda9d43f67f40d423de9070367d10036
7+
SHA512 (go1.25.8.src.tar.gz) = 2f5c9f314d18169985a9a4b19346e00dd5d4b396c8c17bfffe5719e51f27d834cc9649d0165f7eeb7367d3b6d384f49917325a40b49ba4da65e22f2c5362c739
8+
Size (go1.25.8.src.tar.gz) = 31991986 bytes
99
SHA1 (patch-misc_ios_clangwrap.sh) = 28ea4426336155d6720f7e16b43f0207b47a6dd8
1010
SHA1 (patch-src_cmd_dist_build.go) = cbb9576f832806b0cbef121ea38ba6a54db95bc3
1111
SHA1 (patch-src_crypto_x509_root__bsd.go) = 0b5dead901450967109303f873a2696c65ccac35

lang/go126/PLIST

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
@comment $NetBSD: PLIST,v 1.1 2026/02/22 15:20:08 bsiegert Exp $
1+
@comment $NetBSD: PLIST,v 1.2 2026/03/06 20:57:34 bsiegert Exp $
22
bin/go${GOVERSSUFFIX}
33
bin/gofmt${GOVERSSUFFIX}
44
go126/CONTRIBUTING.md
@@ -2631,7 +2631,6 @@ go126/src/cmd/go/testdata/script/mod_init_invalid_major.txt
26312631
go126/src/cmd/go/testdata/script/mod_init_issue74784.txt
26322632
go126/src/cmd/go/testdata/script/mod_init_path.txt
26332633
go126/src/cmd/go/testdata/script/mod_init_tidy.txt
2634-
go126/src/cmd/go/testdata/script/mod_init_version.txt
26352634
go126/src/cmd/go/testdata/script/mod_insecure_issue63845.txt
26362635
go126/src/cmd/go/testdata/script/mod_install_hint.txt
26372636
go126/src/cmd/go/testdata/script/mod_install_pkg_version.txt
@@ -2991,7 +2990,6 @@ go126/src/cmd/go/testdata/script/work_implicit_go_requirement.txt
29912990
go126/src/cmd/go/testdata/script/work_init_gowork.txt
29922991
go126/src/cmd/go/testdata/script/work_init_path.txt
29932992
go126/src/cmd/go/testdata/script/work_init_toolchain.txt
2994-
go126/src/cmd/go/testdata/script/work_init_version.txt
29952993
go126/src/cmd/go/testdata/script/work_install_submodule.txt
29962994
go126/src/cmd/go/testdata/script/work_issue51204.txt
29972995
go126/src/cmd/go/testdata/script/work_issue54048.txt
@@ -7456,6 +7454,7 @@ go126/src/internal/poll/fd_windows_test.go
74567454
go126/src/internal/poll/fd_writev_libc.go
74577455
go126/src/internal/poll/fd_writev_unix.go
74587456
go126/src/internal/poll/file_plan9.go
7457+
go126/src/internal/poll/fstatat_unix.go
74597458
go126/src/internal/poll/hook_cloexec.go
74607459
go126/src/internal/poll/hook_unix.go
74617460
go126/src/internal/poll/hook_windows.go
@@ -9329,6 +9328,9 @@ go126/src/os/stat_test.go
93299328
go126/src/os/stat_unix.go
93309329
go126/src/os/stat_wasip1.go
93319330
go126/src/os/stat_windows.go
9331+
go126/src/os/statat.go
9332+
go126/src/os/statat_other.go
9333+
go126/src/os/statat_unix.go
93329334
go126/src/os/sticky_bsd.go
93339335
go126/src/os/sticky_notbsd.go
93349336
go126/src/os/sys.go
@@ -14072,7 +14074,11 @@ go126/test/fixedbugs/issue76950.go
1407214074
go126/test/fixedbugs/issue7740.go
1407314075
go126/test/fixedbugs/issue7742.go
1407414076
go126/test/fixedbugs/issue7746.go
14077+
go126/test/fixedbugs/issue77534.go
1407514078
go126/test/fixedbugs/issue7760.go
14079+
go126/test/fixedbugs/issue77604.go
14080+
go126/test/fixedbugs/issue77613.go
14081+
go126/test/fixedbugs/issue77779.go
1407614082
go126/test/fixedbugs/issue7794.go
1407714083
go126/test/fixedbugs/issue7863.go
1407814084
go126/test/fixedbugs/issue7867.go

lang/go126/distinfo

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
1-
$NetBSD: distinfo,v 1.1 2026/02/22 15:20:08 bsiegert Exp $
1+
$NetBSD: distinfo,v 1.2 2026/03/06 20:57:34 bsiegert Exp $
22

3-
BLAKE2s (go1.26.0.src.tar.gz) = ba0872955f7f5ed46ff518c3c285bb34856d3568699254b2999dbe7a60e1a313
4-
SHA512 (go1.26.0.src.tar.gz) = 93858b64ef0f0963af4efa5f7a0465e76827b80a9926e965da6abeb2ad1b261bcfb3c1911364edd8bc2488fda47cc56e13816b4d7174413b17656b681c139964
5-
Size (go1.26.0.src.tar.gz) = 34095450 bytes
3+
BLAKE2s (go1.26.1.src.tar.gz) = f7d0d40cf99b132681c8736887316d983c43cee225fefe48e0f58b9e47b75481
4+
SHA512 (go1.26.1.src.tar.gz) = 7bab2a762b4aff1c2c3a3cf3ad20bce63fabff28c7ff63b18cb8b0ce427a7bc1781cfd3fa291f4bff499247b1f0fd56f1698bb19bc7c1be7d7d2f38716438d41
5+
Size (go1.26.1.src.tar.gz) = 34108253 bytes
66
SHA1 (patch-misc_ios_clangwrap.sh) = 28ea4426336155d6720f7e16b43f0207b47a6dd8
77
SHA1 (patch-src_cmd_dist_build.go) = cbb9576f832806b0cbef121ea38ba6a54db95bc3
88
SHA1 (patch-src_crypto_x509_root__bsd.go) = 0b5dead901450967109303f873a2696c65ccac35

0 commit comments

Comments
 (0)