Skip to content
Success

Changes

Summary

  1. Bump golang 1.11.13 (CVE-2019-9512, CVE-2019-9514) (details)
Commit 9a7c1a1e5f0858ac54f1c7577c4fca8665f70496 by Sebastiaan van Stijn
Bump golang 1.11.13 (CVE-2019-9512, CVE-2019-9514)
go1.11.13 (released 2019/08/13) includes security fixes to the net/http
and net/url packages. See the Go 1.11.13 milestone on our issue tracker
for details:
https://github.com/golang/go/issues?q=milestone%3AGo1.11.13
- net/http: Denial of Service vulnerabilities in the HTTP/2
implementation
net/http and golang.org/x/net/http2 servers that accept direct
connections from untrusted
clients could be remotely made to allocate an unlimited amount of
memory, until the program
crashes. Servers will now close connections if the send queue
accumulates too many control
messages.
The issues are CVE-2019-9512 and CVE-2019-9514, and Go issue
golang.org/issue/33606.
Thanks to Jonathan Looney from Netflix for discovering and reporting
these issues.
This is also fixed in version v0.0.0-20190813141303-74dc4d7220e7 of
golang.org/x/net/http2.
net/url: parsing validation issue
- url.Parse would accept URLs with malformed hosts, such that the Host
field could have arbitrary
suffixes that would appear in neither Hostname() nor Port(), allowing
authorization bypasses
in certain applications. Note that URLs with invalid, not numeric ports
will now return an error
from url.Parse.
The issue is CVE-2019-14809 and Go issue golang.org/issue/29098.
Thanks to Julian Hector and Nikolai Krein from Cure53, and Adi Cohen
(adico.me) for discovering
and reporting this issue.
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
The file was modified rpm/Makefile (diff)
The file was modified Makefile (diff)
The file was modified image/Makefile (diff)
The file was modified deb/Makefile (diff)

Summary

  1. Bump golang 1.11.13 (CVE-2019-9512, CVE-2019-9514) (details)
Commit 9a7c1a1e5f0858ac54f1c7577c4fca8665f70496 by Sebastiaan van Stijn
Bump golang 1.11.13 (CVE-2019-9512, CVE-2019-9514)
go1.11.13 (released 2019/08/13) includes security fixes to the net/http
and net/url packages. See the Go 1.11.13 milestone on our issue tracker
for details:
https://github.com/golang/go/issues?q=milestone%3AGo1.11.13
- net/http: Denial of Service vulnerabilities in the HTTP/2
implementation
net/http and golang.org/x/net/http2 servers that accept direct
connections from untrusted
clients could be remotely made to allocate an unlimited amount of
memory, until the program
crashes. Servers will now close connections if the send queue
accumulates too many control
messages.
The issues are CVE-2019-9512 and CVE-2019-9514, and Go issue
golang.org/issue/33606.
Thanks to Jonathan Looney from Netflix for discovering and reporting
these issues.
This is also fixed in version v0.0.0-20190813141303-74dc4d7220e7 of
golang.org/x/net/http2.
net/url: parsing validation issue
- url.Parse would accept URLs with malformed hosts, such that the Host
field could have arbitrary
suffixes that would appear in neither Hostname() nor Port(), allowing
authorization bypasses
in certain applications. Note that URLs with invalid, not numeric ports
will now return an error
from url.Parse.
The issue is CVE-2019-14809 and Go issue golang.org/issue/29098.
Thanks to Julian Hector and Nikolai Krein from Cure53, and Adi Cohen
(adico.me) for discovering
and reporting this issue.
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
The file was modified image/Makefile (diff)
The file was modified rpm/Makefile (diff)
The file was modified deb/Makefile (diff)
The file was modified Makefile (diff)