Synopsis:
golang security updateSummary:
An update for golang is now available for openEuler-24.03-LTS-SP1Description:
.
Security Fix(es):
url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.(CVE-2026-25679)
On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.(CVE-2026-27139)Topic:
An update for golang is now available for openEuler-24.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.Severity:
HighAffected Component:
golang
1.21.4-44.oe2403sp11.21.4-44.oe2403sp11.21.4-44.oe2403sp1Exploitability
AV:NAC:LPR:NUI:NScope
S:UImpact
C:NI:NA:H7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H