Amazon Linux 2023 Security Advisory: ALAS2023-2026-1482
Advisory Released Date: 2026-03-25
Advisory Updated Date: 2026-03-25
FAQs regarding Amazon Linux ALAS/CVE Severity
url.Parse insufficiently validated the host/authority component and accepted some invalid URLs. (CVE-2026-25679)
On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root. (CVE-2026-27139)
Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value "refresh". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow "url=" by setting htmlmetacontenturlescape=0. (CVE-2026-27142)
Affected Packages:
golang
Issue Correction:
Run dnf update golang --releasever 2023.10.20260316 or dnf update --advisory ALAS2023-2026-1482 --releasever 2023.10.20260316 to update your system.
More information on how to update your system can be found on this page: Amazon Linux 2023 documentation
aarch64:
golang-1.25.8-1.amzn2023.0.1.aarch64
golang-bin-1.25.8-1.amzn2023.0.1.aarch64
golang-shared-1.25.8-1.amzn2023.0.1.aarch64
noarch:
golang-docs-1.25.8-1.amzn2023.0.1.noarch
golang-misc-1.25.8-1.amzn2023.0.1.noarch
golang-src-1.25.8-1.amzn2023.0.1.noarch
golang-tests-1.25.8-1.amzn2023.0.1.noarch
src:
golang-1.25.8-1.amzn2023.0.1.src
x86_64:
golang-1.25.8-1.amzn2023.0.1.x86_64
golang-bin-1.25.8-1.amzn2023.0.1.x86_64
golang-shared-1.25.8-1.amzn2023.0.1.x86_64