Amazon Linux 2 Security Advisory: ALAS2-2026-3202
Advisory Released Date: 2026-03-19
Advisory Updated Date: 2026-03-19
FAQs regarding Amazon Linux ALAS/CVE Severity
url.Parse insufficiently validated the host/authority component and accepted some invalid URLs. (CVE-2026-25679)
On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root. (CVE-2026-27139)
Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value "refresh". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow "url=" by setting htmlmetacontenturlescape=0. (CVE-2026-27142)
Affected Packages:
golist
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update golist or yum update --advisory ALAS2-2026-3202 to update your system.
aarch64:
golist-0.10.1-10.amzn2.0.11.aarch64
golist-debuginfo-0.10.1-10.amzn2.0.11.aarch64
src:
golist-0.10.1-10.amzn2.0.11.src
x86_64:
golist-0.10.1-10.amzn2.0.11.x86_64
golist-debuginfo-0.10.1-10.amzn2.0.11.x86_64