ALAS2023-2026-1482


Amazon Linux 2023 Security Advisory: ALAS2023-2026-1482
Advisory Released Date: 2026-03-25
Advisory Updated Date: 2026-03-25
Severity: Medium

Issue Overview:

url.Parse insufficiently validated the host/authority component and accepted some invalid URLs. (CVE-2026-25679)

On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root. (CVE-2026-27139)

Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value "refresh". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow "url=" by setting htmlmetacontenturlescape=0. (CVE-2026-27142)


Affected Packages:

golang


Issue Correction:
Run dnf update golang --releasever 2023.10.20260316 or dnf update --advisory ALAS2023-2026-1482 --releasever 2023.10.20260316 to update your system.
More information on how to update your system can be found on this page: Amazon Linux 2023 documentation

New Packages:
aarch64:
    golang-1.25.8-1.amzn2023.0.1.aarch64
    golang-bin-1.25.8-1.amzn2023.0.1.aarch64
    golang-shared-1.25.8-1.amzn2023.0.1.aarch64

noarch:
    golang-docs-1.25.8-1.amzn2023.0.1.noarch
    golang-misc-1.25.8-1.amzn2023.0.1.noarch
    golang-src-1.25.8-1.amzn2023.0.1.noarch
    golang-tests-1.25.8-1.amzn2023.0.1.noarch

src:
    golang-1.25.8-1.amzn2023.0.1.src

x86_64:
    golang-1.25.8-1.amzn2023.0.1.x86_64
    golang-bin-1.25.8-1.amzn2023.0.1.x86_64
    golang-shared-1.25.8-1.amzn2023.0.1.x86_64