go security

  1. Go 1.26 CVE-2026-27138 X509 Verification Panic Fixed in 1.26.1

    A new security advisory affecting the Go standard library's crypto/x509 package — tracked as CVE-2026-27138 — warns that certificate chain verification can panic when an intermediate or leaf certificate contains an empty DNS name while another certificate in the same chain includes excluded name...
  2. Go TOCTOU Fix in os Root Metadata: Update to Go 1.26.1

    The Go standard library has picked up a subtle but meaningful security fix: a time‑of‑check/time‑of‑use (TOCTOU) race in the os package could let a returned FileInfo refer to a file outside a previously opened Root, allowing an attacker to probe filesystem metadata outside the intended root. The...
  3. Go html/template CVE-2026-27142: Meta Refresh XSS Fix in Go 1.26.1 and 1.25.8

    The Go standard library's html/template package has a newly disclosed security flaw — tracked as CVE-2026-27142 — that can leave web applications vulnerable to cross-site scripting (XSS) when untrusted values are templated into the content attribute of HTML meta tags, particularly those using...
  4. Mitigating CVE-2023-24534: Go HTTP Header Parsing DoS and Patch Guide

    A subtle bug in the Go standard library’s HTTP and MIME header parsing — tracked as CVE-2023-24534 — allows specially crafted requests to force excessive memory allocation inside the net/http and net/textproto packages, producing a practical denial-of-service (DoS) vector that can exhaust...
  5. CVE-2024-24791: Go net/http Expect 100-continue bug leads to proxy DoS

    Go’s net/http standard library contains a subtle protocol-handling bug — tracked as CVE-2024-24791 — that can be weaponized to cause sustained denial-of-service conditions against Go-based HTTP proxies and other components that reuse HTTP connections, and operators must treat it as a...
  6. CVE-2024-37298 DoS in Gorilla Schema: Upgrade to v1.4.1 and Enable MaxSize

    A high‑severity denial‑of‑service vulnerability — tracked as CVE‑2024‑37298 — was disclosed in the popular Go library github.com/gorilla/schema, allowing an attacker to force unbounded memory allocations when the library decodes form or query parameters into structs that contain slices of nested...
  7. CVE-2021-33198: Go big.Rat parsing DoS fix

    A subtle parsing bug in Go’s standard library — specifically in the math/big package’s handling of rational numbers — could be weaponized to crash processes and deny service: inputs with excessively large exponents passed to (big.Rat).SetString or (big.Rat).UnmarshalText may trigger a panic or...
  8. CVE-2023-39325: Go HTTP/2 Rapid Reset Fix and Azure Linux Attestation

    Go’s net/http HTTP/2 “rapid reset” weakness (CVE-2023-39325) is real, it was fixed upstream, and Microsoft’s short public mapping that “Azure Linux includes this open‑source library and is therefore potentially affected” is an authoritative product‑level attestation — but it is not a blanket...
  9. Go Gob Decoder DoS: CVE-2024-34156 Stack Exhaustion and Mitigation

    A critical availability weakness in Go’s standard library — tracked as CVE-2024-34156 — lets an attacker reliably crash a process that decodes untrusted gob data by driving the decoder into stack exhaustion. The flaw is simple in concept but serious in consequence: calling encoding/gob’s...
  10. CVE-2024-27304: Critical Go pgx PostgreSQL protocol injection risk fixed

    A subtle arithmetic bug in a widely used Go PostgreSQL driver—pgx—turned into a critical SQL‑injection risk: if an attacker can force a single query or bind message to exceed 4 GB, a 32‑bit size calculation can wrap and let the attacker fragment and inject protocol messages, enabling arbitrary...
  11. Go gzip Reader DoS: CVE-2022-30631 Fixed in Go 1.17.12 and 1.18.4

    A simple, malformed gzip archive can still bring down a Go-based service: an uncontrolled recursion bug in Go’s standard library compress/gzip Reader.Read lets an attacker crash applications by exhausting the stack when parsing archives composed of many concatenated zero-length compressed files...
  12. CVE-2016-3959: Go DSA Verify DoS Fix and Early Validation

    The Verify function in Go’s crypto/dsa implementation (crypto/dsa/dsa.go) contained an input‑validation flaw that could be weaponized to force an application into an infinite loop and an effective denial‑of‑service; the bug was tracked as CVE‑2016‑3959 and fixed in the emergency releases Go...
  13. Expr Recursion DoS: CVE-2025-68156 Patch and MaxDepth Guard

    Expr’s evaluator can be crashed by ordinary builtin calls: a newly assigned CVE shows several widely used functions in the Expr Go package performed unbounded recursion over user-supplied data and could exhaust the Go runtime stack, allowing attackers to cause a process-level denial of service...
  14. CVE-2023-45284: Azure Linux Attestation and Go IsLocal Risk on Windows

    Microsoft’s short advisory that “Azure Linux includes this open‑source library and is therefore potentially affected” is accurate — but it is a product‑scoped inventory statement, not a categorical guarantee that no other Microsoft product can include the same vulnerable Go library. Background /...
  15. Logrus DoS Patch: Fix for 64 KB Line Token Break in Go Logging

    A denial-of-service flaw in the widely used Go logging library logrus can render Entry.Writer unusable when it receives a single-line log payload larger than 64 KB with no newline characters, creating the potential for sustained or persistent application unavailability until the library is...
  16. CVE-2025-47912: Go net/url Bracket Parsing Bug in Azure Linux

    The Go standard library vulnerability tracked as CVE-2025-47912 — a flaw in net/url that allows values other than IPv6 addresses to appear inside square-bracketed host components — has been publicly disclosed and patched upstream, and Microsoft’s initial machine-readable attestations currently...
  17. Go crypto x509 DSA DoS CVE-2025-58188: Patch and Mitigations

    A high-severity bug in the Go standard library — tracked as CVE-2025-58188 — can cause programs to panic during X.509 certificate validation when a certificate chain contains a DSA public key, enabling an attacker to induce denial-of-service conditions against any application that validates...