Skip to content

chore(deps): update go toolchain directive to v1.26.3 [security]#143

Open
renovate[bot] wants to merge 1 commit into
mainfrom
renovate/golang-version-go-vulnerability
Open

chore(deps): update go toolchain directive to v1.26.3 [security]#143
renovate[bot] wants to merge 1 commit into
mainfrom
renovate/golang-version-go-vulnerability

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented May 20, 2026

This PR contains the following updates:

Package Type Update Change
go (source) toolchain patch 1.26.21.26.3
go (source) golang patch 1.26.21.26.3

Infinite loop in HTTP/2 transport when given bad SETTINGS_MAX_FRAME_SIZE in net/http/internal/http2 in golang.org/x/net

BIT-golang-2026-33814 / CVE-2026-33814 / GO-2026-4918

More information

Details

When processing HTTP/2 SETTINGS frames, transport will enter an infinite loop of writing CONTINUATION frames if it receives a SETTINGS_MAX_FRAME_SIZE with a value of 0.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Panic in Dial and LookupPort when handling NUL byte on Windows in net

BIT-golang-2026-39836 / CVE-2026-39836 / GO-2026-4971

More information

Details

The Dial and LookupPort functions panic on Windows when provided with an input containing a NUL (0).

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


ReverseProxy forwards queries with more than urlmaxqueryparams parameters in net/http/httputil

BIT-golang-2026-39825 / CVE-2026-39825 / GO-2026-4976

More information

Details

ReverseProxy can forward queries containing parameters not visible to Rewrite functions.

When used with a Rewrite function, or a Director function which parses query parameters, ReverseProxy sanitizes the forwarded request to remove query parameters which are not parsed by url.ParseQuery. ReverseProxy does not take ParseQuery's limit on the total number of query parameters (controlled by GODEBUG=urlmaxqueryparams=N) into account. This can permit ReverseProxy to forward a request containing a query parameter that is not visible to the Rewrite function.

For example, the query "a1=x&a2=x&...&a10000=x&hidden=y" can forward the parameter "hidden=y" while hiding it from the proxy's Rewrite function.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Quadratic string concatenation in consumePhrase in net/mail

BIT-golang-2026-42499 / CVE-2026-42499 / GO-2026-4977

More information

Details

Pathological inputs could cause DoS through consumePhrase when parsing an email address according to RFC 5322.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Escaper bypass leads to XSS in html/template

BIT-golang-2026-39826 / CVE-2026-39826 / GO-2026-4980

More information

Details

If a trusted template author were to write a <script> tag containing an empty 'type' attribute or a 'type' attribute with an ASCII whitespace, the execution of the template would incorrectly escape any data passed into the <script> block.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Crash when handling long CNAME response in net

BIT-golang-2026-33811 / CVE-2026-33811 / GO-2026-4981

More information

Details

When using LookupCNAME with the cgo DNS resolver, a very long CNAME response can trigger a double-free of C memory and a crash.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Bypass of meta content URL escaping causes XSS in html/template

BIT-golang-2026-39823 / CVE-2026-39823 / GO-2026-4982

More information

Details

CVE-2026-27142 fixed a vulnerability in which URLs were not correctly escaped inside of a tag's attribute. If the URL content were to insert ASCII whitespaces around the '=' rune inside of the attribute, the escaper would fail to similarly escape it, leading to XSS.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Quadratic string concatentation in consumeComment in net/mail

BIT-golang-2026-39820 / CVE-2026-39820 / GO-2026-4986

More information

Details

Well-crafted inputs reaching ParseAddress, ParseAddressList, and ParseDate were able to trigger excessive CPU exhaustion and memory allocations.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Release Notes

golang/go (go)

v1.26.3


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • At any time (no schedule defined)
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about these updates again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate Bot requested a review from lis0x90 as a code owner May 20, 2026 10:42
@sonarqubecloud
Copy link
Copy Markdown

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant