<feed xmlns='http://www.w3.org/2005/Atom'>
<title>go, branch go1.25.8</title>
<subtitle>Fork of Go programming language with my patches.</subtitle>
<id>http://git.kilabit.info/go/atom?h=go1.25.8</id>
<link rel='self' href='http://git.kilabit.info/go/atom?h=go1.25.8'/>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/'/>
<updated>2026-03-06T00:26:43Z</updated>
<entry>
<title>[release-branch.go1.25] go1.25.8</title>
<updated>2026-03-06T00:26:43Z</updated>
<author>
<name>Gopher Robot</name>
<email>gobot@golang.org</email>
</author>
<published>2026-03-06T00:21:14Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=439ff996f0ee506fc2eb84b7f11ffc360a6299f2'/>
<id>urn:sha1:439ff996f0ee506fc2eb84b7f11ffc360a6299f2</id>
<content type='text'>
Change-Id: Ibbe87e0b8afcff83ecbf8fc441a2fd4823c999fa
Reviewed-on: https://go-review.googlesource.com/c/go/+/752122
TryBot-Bypass: Gopher Robot &lt;gobot@golang.org&gt;
Reviewed-by: Cherry Mui &lt;cherryyz@google.com&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Reviewed-by: Jakub Ciolek &lt;jakub@ciolek.dev&gt;
Auto-Submit: Gopher Robot &lt;gobot@golang.org&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.25] html/template: properly escape URLs in meta content attributes</title>
<updated>2026-03-06T00:15:29Z</updated>
<author>
<name>Roland Shoemaker</name>
<email>bracewell@google.com</email>
</author>
<published>2026-01-09T19:12:01Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=a9db31e6d9f280418ce441067f3f9dc0a036e770'/>
<id>urn:sha1:a9db31e6d9f280418ce441067f3f9dc0a036e770</id>
<content type='text'>
The meta tag can include a content attribute that contains URLs, which
we currently don't escape if they are inserted via a template action.
This can plausibly lead to XSS vulnerabilities if untrusted data is
inserted there, the http-equiv attribute is set to "refresh", and the
content attribute contains an action like `url={{.}}`.

Track whether we are inside of a meta element, if we are inside of a
content attribute, _and_ if the content attribute contains "url=". If
all of those are true, then we will apply the same URL escaping that we
use elsewhere.

Also add a new GODEBUG, htmlmetacontenturlescape, to allow disabling this
escaping for cases where this behavior is considered safe. The behavior
can be disabled by setting htmlmetacontenturlescape=0.

Updates #77954
Fixes #77971
Fixes CVE-2026-27142

Change-Id: I9bbca263be9894688e6ef1e9a8f8d2f4304f5873
Reviewed-on: https://go-internal-review.googlesource.com/c/go/+/3360
Reviewed-by: Neal Patel &lt;nealpatel@google.com&gt;
Reviewed-by: Nicholas Husin &lt;husin@google.com&gt;
Reviewed-on: https://go-internal-review.googlesource.com/c/go/+/3644
Reviewed-by: Damien Neil &lt;dneil@google.com&gt;
Commit-Queue: Roland Shoemaker &lt;bracewell@google.com&gt;
Reviewed-on: https://go-review.googlesource.com/c/go/+/752101
Auto-Submit: Gopher Robot &lt;gobot@golang.org&gt;
TryBot-Bypass: Gopher Robot &lt;gobot@golang.org&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Reviewed-by: Cherry Mui &lt;cherryyz@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.25] net/url: reject IPv6 literal not at start of host</title>
<updated>2026-03-06T00:15:25Z</updated>
<author>
<name>Ian Alexander</name>
<email>jitsu@google.com</email>
</author>
<published>2026-01-28T20:29:52Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=d8174a9500d53784594b198f6195d1fae8dfe803'/>
<id>urn:sha1:d8174a9500d53784594b198f6195d1fae8dfe803</id>
<content type='text'>
This change rejects IPv6 literals that do not appear at the start of the
host subcomponent of a URL.

For example:
  http://example.com[::1] -&gt; rejects
  http://[::1]            -&gt; accepts

Thanks to Masaki Hara (https://github.com/qnighy) of Wantedly.

Updates #77578
Fixes #77969
Fixes CVE-2026-25679

Change-Id: I7109031880758f7c1eb4eca513323328feace33c
Reviewed-on: https://go-internal-review.googlesource.com/c/go/+/3400
Reviewed-by: Neal Patel &lt;nealpatel@google.com&gt;
Reviewed-by: Roland Shoemaker &lt;bracewell@google.com&gt;
Reviewed-on: https://go-internal-review.googlesource.com/c/go/+/3642
Reviewed-on: https://go-review.googlesource.com/c/go/+/752100
Reviewed-by: Cherry Mui &lt;cherryyz@google.com&gt;
Auto-Submit: Gopher Robot &lt;gobot@golang.org&gt;
TryBot-Bypass: Gopher Robot &lt;gobot@golang.org&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.25] os: avoid escape from Root via ReadDir or Readdir</title>
<updated>2026-02-27T21:46:29Z</updated>
<author>
<name>Damien Neil</name>
<email>dneil@google.com</email>
</author>
<published>2026-02-26T17:54:33Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=4091800393d254befde3770fd16f51200ebd5a3d'/>
<id>urn:sha1:4091800393d254befde3770fd16f51200ebd5a3d</id>
<content type='text'>
When reading the contents of a directory using
File.ReadDir or File.Readdir, the os.FileInfo was
populated on Unix platforms using lstat.
This lstat call is vulnerable to a TOCTOU race
and could escape the root.

For example:
  - Open the directory "dir" within a Root.
    This directory contains a file named "file".
  - Use File.ReadDir to list the contents of "dir",
    receiving a os.DirEntry for "dir/file".
  - Replace "dir" with a symlink to "/etc".
  - Use DirEntry.Info to retrieve the FileInfo for "dir/file".
    This FileInfo contains information on "/etc/file" instead.

This escape permits identifying the presence or absence of
files outside a Root, as well as retreiving stat metadata
(size, mode, modification time, etc.) for files outside a Root.

This escape does not permit reading or writing to files
outside a Root.

For #77827
Fixes #77833
Fixes CVE-2026-27139

Change-Id: I40004f830c588e516aff8ee593d630d36a6a6964
Reviewed-on: https://go-review.googlesource.com/c/go/+/749480
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Reviewed-by: Nicholas Husin &lt;husin@google.com&gt;
Reviewed-by: Nicholas Husin &lt;nsh@golang.org&gt;
Auto-Submit: Damien Neil &lt;dneil@google.com&gt;
(cherry picked from commit 657ed934e85dc575aad51356c4b437961e7c1313)
Reviewed-on: https://go-review.googlesource.com/c/go/+/749920
</content>
</entry>
<entry>
<title>[release-branch.go1.25] internal/syscall/windows: correct some enums and syscall signatures</title>
<updated>2026-02-26T17:26:25Z</updated>
<author>
<name>Michal Pristas</name>
<email>michal.pristas@gmail.com</email>
</author>
<published>2026-02-13T18:19:04Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=0ee4ab4c3f4f02ed9edee4e2479ced7177d5b03b'/>
<id>urn:sha1:0ee4ab4c3f4f02ed9edee4e2479ced7177d5b03b</id>
<content type='text'>
This CL corrects code submitted in CL 741040.

Fixes #77406

Change-Id: I1c22c1a9f77028f3c2a8e3905f2ec5b071b5445e
GitHub-Last-Rev: 2bfb07310b4707484b5bdce96ad367db567741c4
GitHub-Pull-Request: golang/go#77525
Reviewed-on: https://go-review.googlesource.com/c/go/+/743780
Reviewed-by: Junyang Shao &lt;shaojunyang@google.com&gt;
Reviewed-by: Alex Brainman &lt;alex.brainman@gmail.com&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Reviewed-by: Mark Freeman &lt;markfreeman@google.com&gt;
Reviewed-on: https://go-review.googlesource.com/c/go/+/749440
Reviewed-by: David Chase &lt;drchase@google.com&gt;
Auto-Submit: Mark Freeman &lt;markfreeman@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.25] os: support deleting inaccessible files in RemoveAll</title>
<updated>2026-02-26T15:38:24Z</updated>
<author>
<name>Michal Pristas</name>
<email>michal.pristas@gmail.com</email>
</author>
<published>2026-02-04T09:36:59Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=9f8fa93be5f36f9c6969aafbc42860b9ba4c9452'/>
<id>urn:sha1:9f8fa93be5f36f9c6969aafbc42860b9ba4c9452</id>
<content type='text'>
windows: retry file open with DELETE access after access denied

Additional access rights when opening files, including SYNCHRONIZE,
break deletion when the caller has FILE_DELETE_CHILD on the parent
directory but not the file. Retry with DELETE only restores correct
Windows semantics.

For #77406

Change-Id: Ie53bc6f1673de1a8af4dcfb7496daf99e71098cb
GitHub-Last-Rev: 0ad635cf1a13c0242e3b1922cf47a8c594dd7215
GitHub-Pull-Request: golang/go#77403
Reviewed-on: https://go-review.googlesource.com/c/go/+/741040
Reviewed-by: Quim Muntal &lt;quimmuntal@gmail.com&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Reviewed-by: Michael Pratt &lt;mpratt@google.com&gt;
Auto-Submit: Michael Pratt &lt;mpratt@google.com&gt;
Reviewed-by: Michael Knyszek &lt;mknyszek@google.com&gt;
Reviewed-on: https://go-review.googlesource.com/c/go/+/746361
Auto-Submit: Mark Freeman &lt;markfreeman@google.com&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.25] all: update x/sys</title>
<updated>2026-02-25T23:51:44Z</updated>
<author>
<name>Mark Freeman</name>
<email>mark@golang.org</email>
</author>
<published>2026-02-25T21:02:50Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=df7331dc32ada0625ab707c8250f255ced7871a1'/>
<id>urn:sha1:df7331dc32ada0625ab707c8250f255ced7871a1</id>
<content type='text'>
For #77406

Change-Id: Id15681ea136469fa3b53d163363dec0c6b0893ae
Reviewed-on: https://go-review.googlesource.com/c/go/+/749162
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Auto-Submit: Mark Freeman &lt;markfreeman@google.com&gt;
Reviewed-by: Mark Freeman &lt;markfreeman@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.25] runtime: don't negate eventfd errno</title>
<updated>2026-02-25T21:57:57Z</updated>
<author>
<name>Michael Pratt</name>
<email>mpratt@google.com</email>
</author>
<published>2025-09-09T20:47:15Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=92544bbc9812d760c20dd454459ea7d12a539088'/>
<id>urn:sha1:92544bbc9812d760c20dd454459ea7d12a539088</id>
<content type='text'>
The Linux syscall package does this for us.

For #75337.
Fixes #77413.

Change-Id: I6a6a636c9bb5fe25fdc6f80dc8b538ebed60d00b
Reviewed-on: https://go-review.googlesource.com/c/go/+/701796
Reviewed-by: Michael Knyszek &lt;mknyszek@google.com&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Auto-Submit: Michael Pratt &lt;mpratt@google.com&gt;
(cherry picked from commit d3be949ada01d7827f8edc87665fef5268634cb3)
Reviewed-on: https://go-review.googlesource.com/c/go/+/741223
Reviewed-by: Michael Pratt &lt;mpratt@google.com&gt;
Reviewed-by: David Chase &lt;drchase@google.com&gt;
Reviewed-by: Florian Lehner &lt;lehner.florian86@gmail.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.25] net/smtp: prevent test failures due to expired test certificate</title>
<updated>2026-02-25T21:16:46Z</updated>
<author>
<name>Nicholas S. Husin</name>
<email>nsh@golang.org</email>
</author>
<published>2026-02-10T22:17:19Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=0c56fa28180c1281bb4934bb6779a72a3fb43f52'/>
<id>urn:sha1:0c56fa28180c1281bb4934bb6779a72a3fb43f52</id>
<content type='text'>
The current localhostCert used for testing seems to have its expiry date
mistakenly set to Mar 18 19:27:54 2026 GMT.

To prevent test failures, use fixed time in tests. Also, regenerate the
certificate so we can fix the time to UNIX epoch (the current
certificate is only valid after Mar 18 2025).

Fixes #77531

Change-Id: I3136d29eaa0c8c4361f5627003f08a0059702f0d
Reviewed-on: https://go-review.googlesource.com/c/go/+/744260
Reviewed-by: David Chase &lt;drchase@google.com&gt;
Reviewed-by: Roland Shoemaker &lt;roland@golang.org&gt;
Reviewed-by: Nicholas Husin &lt;husin@google.com&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
(cherry picked from commit 215a070a049ce449480ca6948e7fafdeb7b16920)
Reviewed-on: https://go-review.googlesource.com/c/go/+/748280
</content>
</entry>
<entry>
<title>[release-branch.go1.25] cmd/go: fix pkg-config flag sanitization</title>
<updated>2026-02-25T20:43:24Z</updated>
<author>
<name>Roland Shoemaker</name>
<email>roland@golang.org</email>
</author>
<published>2026-02-03T02:29:51Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=592530ed6b10205d0bbe724d7287278e89381dfc'/>
<id>urn:sha1:592530ed6b10205d0bbe724d7287278e89381dfc</id>
<content type='text'>
Implement a new pkg-config safe flag list (containing everything except
for --log-file) and use that when checking flags passed to pkg-config,
instead of using checkCompilerFlags.

Updates #77387
Fixes #77438

Change-Id: Id6141d0a2934053aa43e3aa8ce402bd499c4c028
Reviewed-on: https://go-review.googlesource.com/c/go/+/741042
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Reviewed-by: Michael Pratt &lt;mpratt@google.com&gt;
Auto-Submit: Roland Shoemaker &lt;roland@golang.org&gt;
Reviewed-by: Ian Lance Taylor &lt;iant@golang.org&gt;
(cherry picked from commit 28fbdf7acb4146b5bc3d88128e407d1344691839)
Reviewed-on: https://go-review.googlesource.com/c/go/+/745481
Reviewed-by: David Chase &lt;drchase@google.com&gt;
</content>
</entry>
</feed>
