On Sun, 18 Jan 2026 20:52:42 +0100 Salvatore Bonaccorso <[email protected]> wrote:

CVE-2025-61731[2]:
| cmd/go: bypass of flag sanitization can lead to arbitrary code
| execution

This one is problematic. An attacker could ship a go.mod containing "toolchain go1.25.5" and introduce the vulnerability if the current toolchain is less than 1.25.5. Since Debian has 1.24.9 (and even if it upgrades to 1.24.12), it will get the issue.

I have engaged a bit upstream about that: https://github.com/golang/go/issues/77099#issuecomment-3769873341. I don't know if upstream has an history of being helpful around downstream issues, but I suppose they should be concerned as running go 1.24.12 (up-to-date) can expose you.

Reply via email to