[CLSA-2026:1772124479] golang: Fix of 7 CVEs
Type:
security
Severity:
Critical
Release date:
2026-03-02 10:30:03 UTC
Description:
- Update to Go 1.25.7 - CVE-2025-61726: fixed DoS due to memory exhaustion flaw in net/url parameter parsing - CVE-2025-61732: fixed RCE via code smuggling flaw in cgo comment parsing - CVE-2025-68121: fixed security bypass in TLS where session resumption could ignore revoked or expired client certificates. - CVE-2025-61731: fixed arbitrary code execution vulnerability in the go command toolchain involving unsafe cgo configuration flags. - CVE-2025-68119: fixed arbitrary code execution risk when the go tool processes malicious version strings from external source control. - CVE-2025-61730: fixed minor information disclosure in TLS 1.3 during specific encrypted handshake message transitions. - CVE-2025-61727: fixed certificate validation bypass where specific wildcard domain constraints were not properly enforced by the security library.
Updated packages:
  • go-toolset-1.25.7-1.el9_6.tuxcare.els1.x86_64.rpm
    sha:4ab01b249bf504bef87a2e5058459dd3d27ac00823fa2a277e277d6454d60be2
  • golang-1.25.7-1.el9_6.tuxcare.els1.x86_64.rpm
    sha:3030f353dfa7a5855d7c257cde650a2fb06cc7695cd4f81f5a87cce8d30fbec8
  • golang-bin-1.25.7-1.el9_6.tuxcare.els1.x86_64.rpm
    sha:5eaa2df0a2163b4f2421988b2241256986eb3fa70dec44ec90761941f2662818
  • golang-docs-1.25.7-1.el9_6.tuxcare.els1.noarch.rpm
    sha:706203379287d58ce253cdcfa733ffeed0da23ad54d9eb7ad05364aacff325a6
  • golang-misc-1.25.7-1.el9_6.tuxcare.els1.noarch.rpm
    sha:e2c6df8a71868e53765a86befa15a6136f1521dc04a8bcc2f0351485702fe70e
  • golang-race-1.25.7-1.el9_6.tuxcare.els1.x86_64.rpm
    sha:a4f167abf92ae199e2d642338e3f6a972ada60117e26fb5f7d571fdf1dd1bfa1
  • golang-src-1.25.7-1.el9_6.tuxcare.els1.noarch.rpm
    sha:2432f19264dc542947756b6a9f7bc351ec90ef3befd01b0c99af2937584c77bb
  • golang-tests-1.25.7-1.el9_6.tuxcare.els1.noarch.rpm
    sha:8ec60f921832875ff139deea7d11154f1b77097bef4829f584abc47def083fd8
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.