Go Releases

Go 1.25.6 release notes: the boring patch that is not boring

Go 1.25.6 release notes: the boring patch that is not boring I’ve watched teams ignore “dot-six” releases, then spend a Friday night chasing a security bulletin they could’ve avoided. Go 1.25.6 landed on 15 Jan 2026 and it ships security fixes, not just housekeeping. What actually changed in Go 1.25.6 Here’s the thing. The release […]

Jack Pauley January 22, 2026 6 min read
Go 1.25.6 release notes

Go 1.25.6 release notes: the boring patch that is not boring

I’ve watched teams ignore “dot-six” releases, then spend a Friday night chasing a security bulletin they could’ve avoided. Go 1.25.6 landed on 15 Jan 2026 and it ships security fixes, not just housekeeping.

What actually changed in Go 1.25.6

Here’s the thing. The release tag itself only bumps the VERSION file, but the release branch includes a set of backported fixes you will feel if you run CI, parse ZIPs, or terminate TLS.

  • cmd/go security fixes (toolchain execution): Upstream lists fixes for unexpected code execution paths when the go tool invokes external tools and toolchains. If you run builds from untrusted inputs, treat this as urgent.
  • net/http ParseForm hardening: The release includes a fix for memory exhaustion in Request.ParseForm when a request carries a huge number of key/value pairs.
  • archive/zip parsing fix: Upstream lists a denial-of-service fix when parsing specially crafted ZIP archives.
  • crypto/tls fixes: The announcement includes fixes around Config.Clone, session ticket keys, and session resumption behavior.

One concrete, verifiable breadcrumb exists. The go1.25.6 tag metadata includes the Change-Id Ib93e4136188fce36867537b30977a03885b8b14f, which shows you exactly what the release tag points at.

Should you upgrade?

Probably yes. Not because “latest is best,” but because this one patches real security edges in common packages.

  • Upgrade quickly if you expose HTTP endpoints: If any service parses forms from the public internet, you do not want a memory blow-up from a single request.
  • Upgrade quickly if you process ZIP uploads: CI systems, artifact services, and import pipelines hit archive formats all the time.
  • Upgrade on a schedule if you only build trusted code: Some folks skip canaries for point releases. I do not, but I get it if you only ship internal tools and you pin images tightly.

I don’t trust “known issues: none” from any project. I trust “we tested it in staging with our own workload.”

How I’d roll this out in a real pipeline

🔔 Never Miss a Breaking Change

Get weekly release intelligence — breaking changes, security patches, and upgrade guides before they break your build.

✅ You're in! Check your inbox for confirmation.

This bit me when we upgraded Go in a container fleet and forgot we pinned different Go versions in two CI runners. Builds “worked,” but cache behavior went sideways and everyone blamed the code.

  • Step 1, inventory versions: Check developer laptops, CI images, and build containers. Run go version in each place and write the output down.
  • Step 2, upgrade from official downloads: Use the Go downloads page for your OS. If you must use a distro package, expect lag and confirm you really got go1.25.6.
  • Step 3, validate with one boring build: Run go test ./… and go build ./… on a representative repo. Then run go mod tidy and confirm it produces no surprise diffs.
  • Step 4, watch for cache weirdness: If builds act flaky, clear the build cache and rerun once. I usually start with go clean -cache in the job that first upgrades.

So. If your team treats Go upgrades as “someone else’s problem,” make this one a calendar event, not a hero moment.

Known issues and references

The upstream announcement does not list known issues for Go 1.25.6, but you should still run a staging build because this release includes security fixes in core packages. Read the official notes and keep the CVE list in your ticket.

Official release notes: https://github.com/golang/go/releases/tag/go1.25.6

Other stuff in this release: backports, security advisories, the usual.

Keep Reading