ALAS2-2026-3203


Amazon Linux 2 Security Advisory: ALAS2-2026-3203
Advisory Released Date: 2026-03-19
Advisory Updated Date: 2026-03-19
Severity: Medium

Issue Overview:

url.Parse insufficiently validated the host/authority component and accepted some invalid URLs. (CVE-2026-25679)

On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root. (CVE-2026-27139)

Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value "refresh". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow "url=" by setting htmlmetacontenturlescape=0. (CVE-2026-27142)


Affected Packages:

golang


Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update golang or yum update --advisory ALAS2-2026-3203 to update your system.

New Packages:
aarch64:
    golang-1.25.8-1.amzn2.0.1.aarch64
    golang-bin-1.25.8-1.amzn2.0.1.aarch64
    golang-shared-1.25.8-1.amzn2.0.1.aarch64

noarch:
    golang-docs-1.25.8-1.amzn2.0.1.noarch
    golang-misc-1.25.8-1.amzn2.0.1.noarch
    golang-tests-1.25.8-1.amzn2.0.1.noarch
    golang-src-1.25.8-1.amzn2.0.1.noarch

src:
    golang-1.25.8-1.amzn2.0.1.src

x86_64:
    golang-1.25.8-1.amzn2.0.1.x86_64
    golang-bin-1.25.8-1.amzn2.0.1.x86_64
    golang-shared-1.25.8-1.amzn2.0.1.x86_64