Ubuntu alert USN-8089-2 (golang-golang-x-net-dev)
| From: | noreply+usn-bot@canonical.com | |
| To: | ubuntu-security-announce@lists.ubuntu.com | |
| Subject: | [USN-8089-2] Go Networking vulnerabilities | |
| Date: | Wed, 01 Apr 2026 06:12:50 +0000 | |
| Message-ID: | <E1w7oos-0000NE-9V@lists.ubuntu.com> |
========================================================================== Ubuntu Security Notice USN-8089-2 March 31, 2026 golang-golang-x-net-dev vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Several security issues were fixed in Go Networking Software Description: - golang-golang-x-net-dev: Supplementary Go networking development files Details: USN-8089-1 fixed vulnerabilities in Go Networking. This update provides the corresponding update to code vendored in golang-golang-x-net-dev. Original advisory details: Bahruz Jabiyev, Tommaso Innocenti, Anthony Gavazzi, Steven Sprecher, and Kaan Onarlioglu discovered that servers using Go Networking could hang during shutdown if preempted by a fatal error. An attacker could possibly use this to cause a denial of service. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-27664) Arpad Ryszka and Jakob Ackermann discovered that a maliciously crafted stream could cause excessive CPU usage in Go Networking's HPACK decoder. An attacker could possibly use this to cause a denial of service. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-41723) Mohammad Thoriq Aziz discovered that Go Networking did not properly sanitize some text nodes. An attacker could possibly use this to execute arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-3978) Sean Ng discovered an error in Go Networking's HTML tag handling. An attacker could possibly use this to cause a denial of service. (CVE-2025-22872) Guido Vranken and Jakub Ciolek discovered that a maliciously crafted HTML document could exhaust system resources on servers using Go Networking. An attacker could possibly use this to cause a denial of service. (CVE-2025-47911) Guido Vranken discovered that a maliciously crafted HTML document could put servers using Go Networking into an infinite loop. An attacker could possibly use this to cause a denial of service. (CVE-2025-58190) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS golang-go.net-dev 1:0.0+git20190811.74dc4d7+dfsg-1ubuntu0.1~esm2 Available with Ubuntu Pro golang-golang-x-net-dev 1:0.0+git20190811.74dc4d7+dfsg-1ubuntu0.1~esm2 Available with Ubuntu Pro Ubuntu 18.04 LTS golang-go.net-dev 1:0.0+git20170629.c81e7f2+dfsg-2ubuntu0.1~esm2 Available with Ubuntu Pro golang-golang-x-net-dev 1:0.0+git20170629.c81e7f2+dfsg-2ubuntu0.1~esm2 Available with Ubuntu Pro Ubuntu 16.04 LTS golang-go.net-dev 1:0.0+git20160110.4fd4a9f-1ubuntu0.1~esm2 Available with Ubuntu Pro golang-golang-x-net-dev 1:0.0+git20160110.4fd4a9f-1ubuntu0.1~esm2 Available with Ubuntu Pro In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-8089-2 https://ubuntu.com/security/notices/USN-8089-1 CVE-2021-33194, CVE-2022-27664, CVE-2022-41723, CVE-2023-3978, CVE-2025-22872, CVE-2025-47911, CVE-2025-58190
Attachment: signature.asc (type=application/pgp-signature)
-----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEE+8neBLO2Hp/ppPlOcpJm3tlzhgEFAmnMKdgACgkQcpJm3tlz hgG2NRAAyjFQ9PGbroGH5Obd6lvOl2K/Vdc3KwHsNHvDTcuLqzwg4fz6CTBRP2N8 OtcoUm9coErQD9CWTpB99LHk5k98y60BKqW8XtHg+B0HuR4pMbKBkILa5U4mHbUx qL4tmVFEmacfkFuYSS4HtLFsirwFfWEAX7z6onGvL6KqKX11bIWdtCcNtlM8CNwc gnoSBFGibamnYV60UhCluRhiU/+2T0ARBaolnYgkkFEQp/poH9CT9p8LDt4AMzxN hf87rMi4UqtbdaNS3NzcsGqqWSEYf0kowFefS16RfzlVIJv9pP4BKESRdaf7DARY peCUczCbMkz/qcdqZwCXHE7tEp4VSWLPWYoK+Z5k+QZ8PrmgcMinJQNN2E5iP18r xBBFm4UB9TceCV0GuPf0M4eVfNcHRnDvHv3yM390LLPMLT2KG5RM090cIVf6XOT6 8wT6ly/IWYuM6WjfUcKC39RFoyFFJSJuK5l3dk5zwroq2LvUwlr5CRPkwtxdbbBQ NWbjDCM5jhhKb38ayy/3YapvdbwPvHsdAVty1D+iqcKqFqVEm4vPm6XQje0SgTVP rjFPO50Qab6yXZjegBBf+LfBSMuQPJ7uBiDlpJBGVghtWBnEueQ8ieE+TEoRt1RC BNO3TzMF4Q2BFIMasUG/nqOBCpqT03sbXpe90gaKnGJ/aoTrzbw= =VvwV -----END PGP SIGNATURE-----
