| Bug | Description |
|---|
| CVE-2026-33810 | When verifying a certificate chain containing excluded DNS constraints ... |
| CVE-2026-32289 | Context was not properly tracked across template branches for JS templ ... |
| CVE-2026-32288 | tar.Reader can allocate an unbounded amount of memory when reading a m ... |
| CVE-2026-32283 | If one side of the TLS connection sends multiple key update messages p ... |
| CVE-2026-32282 | On Linux, if the target of Root.Chmod is replaced with a symlink while ... |
| CVE-2026-32281 | Validating certificate chains which use policies is unexpectedly ineff ... |
| CVE-2026-32280 | During chain building, the amount of work that is done is not correctl ... |
| CVE-2026-27144 | The compiler is meant to unwrap pointers which are the operands of a m ... |
| CVE-2026-27143 | Arithmetic over induction variables in loops were not correctly checke ... |
| CVE-2026-27142 | Actions which insert URLs into the content attribute of HTML meta tags ... |
| CVE-2026-27140 | SWIG file names containing 'cgo' and well-crafted payloads could lead ... |
| CVE-2026-27139 | On Unix platforms, when listing the contents of a directory using File ... |
| CVE-2026-27138 | Certificate verification can panic when a certificate in the chain has ... |
| CVE-2026-27137 | When verifying a certificate chain which contains a certificate contai ... |
| CVE-2026-25679 | url.Parse insufficiently validated the host/authority component and ac ... |