Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.5
Go development tools for RHEL 8 are insecure
RHSA-2026:2708
Summary
Some Go development tools for Red Hat Enterprise Linux 8 are outdated and need to be updated to prevent potential security risks. This update will ensure the tools are secure and up-to-date, protecting against potential attacks. Update your tools as soon as possible to stay safe.
What to do
- Update redhat delve to version 0:1.25.2-1.module+el8.10.0+23746+9db33b5e.
- Update redhat delve-debuginfo to version 0:1.25.2-1.module+el8.10.0+23746+9db33b5e.
- Update redhat delve-debugsource to version 0:1.25.2-1.module+el8.10.0+23746+9db33b5e.
- Update redhat go-toolset to version 0:1.25.7-1.module+el8.10.0+23993+83a15e10.
- Update redhat golang to version 0:1.25.7-1.module+el8.10.0+23993+83a15e10.
- Update redhat golang-bin to version 0:1.25.7-1.module+el8.10.0+23993+83a15e10.
- Update redhat golang-docs to version 0:1.25.7-1.module+el8.10.0+23993+83a15e10.
- Update redhat golang-misc to version 0:1.25.7-1.module+el8.10.0+23993+83a15e10.
- Update redhat golang-race to version 0:1.25.7-1.module+el8.10.0+23993+83a15e10.
- Update redhat golang-src to version 0:1.25.7-1.module+el8.10.0+23993+83a15e10.
- Update redhat golang-tests to version 0:1.25.7-1.module+el8.10.0+23993+83a15e10.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | delve | <= 0:1.25.2-1.module+el8.10.0+23746+9db33b5e | 0:1.25.2-1.module+el8.10.0+23746+9db33b5e |
| redhat | delve-debuginfo | <= 0:1.25.2-1.module+el8.10.0+23746+9db33b5e | 0:1.25.2-1.module+el8.10.0+23746+9db33b5e |
| redhat | delve-debugsource | <= 0:1.25.2-1.module+el8.10.0+23746+9db33b5e | 0:1.25.2-1.module+el8.10.0+23746+9db33b5e |
| redhat | go-toolset | <= 0:1.25.7-1.module+el8.10.0+23993+83a15e10 | 0:1.25.7-1.module+el8.10.0+23993+83a15e10 |
| redhat | golang | <= 0:1.25.7-1.module+el8.10.0+23993+83a15e10 | 0:1.25.7-1.module+el8.10.0+23993+83a15e10 |
| redhat | golang-bin | <= 0:1.25.7-1.module+el8.10.0+23993+83a15e10 | 0:1.25.7-1.module+el8.10.0+23993+83a15e10 |
| redhat | golang-docs | <= 0:1.25.7-1.module+el8.10.0+23993+83a15e10 | 0:1.25.7-1.module+el8.10.0+23993+83a15e10 |
| redhat | golang-misc | <= 0:1.25.7-1.module+el8.10.0+23993+83a15e10 | 0:1.25.7-1.module+el8.10.0+23993+83a15e10 |
| redhat | golang-race | <= 0:1.25.7-1.module+el8.10.0+23993+83a15e10 | 0:1.25.7-1.module+el8.10.0+23993+83a15e10 |
| redhat | golang-src | <= 0:1.25.7-1.module+el8.10.0+23993+83a15e10 | 0:1.25.7-1.module+el8.10.0+23993+83a15e10 |
| redhat | golang-tests | <= 0:1.25.7-1.module+el8.10.0+23993+83a15e10 | 0:1.25.7-1.module+el8.10.0+23993+83a15e10 |
Original title
Red Hat Security Advisory: go-toolset:rhel8 security update
osv CVSS3.1
7.5
- https://access.redhat.com/errata/RHSA-2026:2708 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#important Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2434431 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2434432 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2437016 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2437111 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2708.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-61726 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-61726 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-61726 Vendor Advisory
- https://go.dev/cl/736712 Third Party Advisory
- https://go.dev/issue/77101 Third Party Advisory
- https://groups.google.com/g/golang-announce/c/Vd2tYVM8eUc Third Party Advisory
- https://pkg.go.dev/vuln/GO-2026-4341 Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-61728 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-61728 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-61728 Vendor Advisory
- https://go.dev/cl/736713 Third Party Advisory
- https://go.dev/issue/77102 Third Party Advisory
- https://pkg.go.dev/vuln/GO-2026-4342 Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-61732 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-61732 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-61732 Vendor Advisory
- https://go.dev/cl/734220 Third Party Advisory
- https://go.dev/issue/76697 Third Party Advisory
- https://groups.google.com/g/golang-announce/c/K09ubi9FQFk Third Party Advisory
- https://pkg.go.dev/vuln/GO-2026-4433 Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2025-68121 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2025-68121 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-68121 Vendor Advisory
- https://go.dev/cl/737700 Third Party Advisory
- https://go.dev/issue/77217 Third Party Advisory
- https://pkg.go.dev/vuln/GO-2026-4337 Vendor Advisory
Published: 17 Feb 2026 · Updated: 7 Mar 2026 · First seen: 6 Mar 2026