pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/lang go112: update to 1.12.8 (security release).



details:   https://anonhg.NetBSD.org/pkgsrc/rev/1ad1d62477a6
branches:  trunk
changeset: 337901:1ad1d62477a6
user:      bsiegert <bsiegert%pkgsrc.org@localhost>
date:      Wed Aug 14 15:42:52 2019 +0000

description:
go112: update to 1.12.8 (security release).

net/http: Denial of Service vulnerabilities in the HTTP/2 implementation

net/http and golang.org/x/net/http2 servers that accept direct connections from
untrusted clients could be remotely made to allocate an unlimited amount of
memory, until the program crashes. Servers will now close connections if the
send queue accumulates too many control messages.

The issues are CVE-2019-9512 and CVE-2019-9514, and Go issue golang.org/issue/33606.
Thanks to Jonathan Looney from Netflix for discovering and reporting these issues.

This is also fixed in version v0.0.0-20190813141303-74dc4d7220e7 of
golang.org/x/net/http2.

net/url: parsing validation issue

url.Parse would accept URLs with malformed hosts, such that the Host field
could have arbitrary suffixes that would appear in neither Hostname() nor
Port(), allowing authorization bypasses in certain applications. Note that URLs
with invalid, not numeric ports will now return an error from url.Parse.

The issue is CVE-2019-14809 and Go issue golang.org/issue/29098.
Thanks to Julian Hector and Nikolai Krein from Cure53, and Adi Cohen (adico.me)
for discovering and reporting this issue.

diffstat:

 lang/go/version.mk  |   4 ++--
 lang/go112/Makefile |   3 +--
 lang/go112/distinfo |  10 +++++-----
 3 files changed, 8 insertions(+), 9 deletions(-)

diffs (47 lines):

diff -r 755e02b9654d -r 1ad1d62477a6 lang/go/version.mk
--- a/lang/go/version.mk        Wed Aug 14 15:20:16 2019 +0000
+++ b/lang/go/version.mk        Wed Aug 14 15:42:52 2019 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: version.mk,v 1.66 2019/08/14 15:17:41 bsiegert Exp $
+# $NetBSD: version.mk,v 1.67 2019/08/14 15:42:52 bsiegert Exp $
 
 CTF_SUPPORTED=         no
 SSP_SUPPORTED=         no
@@ -6,7 +6,7 @@
 
 .include "../../mk/bsd.prefs.mk"
 
-GO112_VERSION= 1.12.7
+GO112_VERSION= 1.12.8
 GO111_VERSION= 1.11.13
 GO110_VERSION= 1.10.8
 GO19_VERSION=  1.9.7
diff -r 755e02b9654d -r 1ad1d62477a6 lang/go112/Makefile
--- a/lang/go112/Makefile       Wed Aug 14 15:20:16 2019 +0000
+++ b/lang/go112/Makefile       Wed Aug 14 15:42:52 2019 +0000
@@ -1,6 +1,5 @@
-# $NetBSD: Makefile,v 1.5 2019/08/11 13:21:21 wiz Exp $
+# $NetBSD: Makefile,v 1.6 2019/08/14 15:42:52 bsiegert Exp $
 
-PKGREVISION= 1
 .include "../../lang/go/version.mk"
 
 DISTNAME=      go${GO112_VERSION}.src
diff -r 755e02b9654d -r 1ad1d62477a6 lang/go112/distinfo
--- a/lang/go112/distinfo       Wed Aug 14 15:20:16 2019 +0000
+++ b/lang/go112/distinfo       Wed Aug 14 15:42:52 2019 +0000
@@ -1,9 +1,9 @@
-$NetBSD: distinfo,v 1.5 2019/07/14 15:19:55 bsiegert Exp $
+$NetBSD: distinfo,v 1.6 2019/08/14 15:42:52 bsiegert Exp $
 
-SHA1 (go1.12.7.src.tar.gz) = 538f6c11e08c4a3872cbf0834a86b334ef3ec561
-RMD160 (go1.12.7.src.tar.gz) = d874ae2ffeee930dbbeadd17512ed179cd175507
-SHA512 (go1.12.7.src.tar.gz) = f84c6b89dea9df21f0efa07564eb80baeee5bc2d68cced5fd645ebb32e9317e60b657afe011c81e7739d8a93e4b4dafa0b4f78431a009d36e05de55f89ed0fd6
-Size (go1.12.7.src.tar.gz) = 21976647 bytes
+SHA1 (go1.12.8.src.tar.gz) = f8f35a7af2795b721d62578b55f43ce638db90db
+RMD160 (go1.12.8.src.tar.gz) = e620fc04e023d88e534c32e6c8334d5c49fbdb87
+SHA512 (go1.12.8.src.tar.gz) = 193a9b08752aa2479c19f5b56fdfe2296c7e6097e0c583290f0fce754ac7571e2ff345f66b69774d8e22f2caa147a3dc15658148017b09e5e7f49fd4569373d4
+Size (go1.12.8.src.tar.gz) = 21978756 bytes
 SHA1 (patch-misc_io_clangwrap.sh) = cd91c47ba0fe7b6eb8009dd261c0c26c7d581c29
 SHA1 (patch-src_cmd_dist_util.go) = 24e6f1b6ded842a8ce322a40e8766f7d344bc47e
 SHA1 (patch-src_cmd_link_internal_ld_elf.go) = 990a54e3baf239916e4c7f0c1d54240e2898601a



Home | Main Index | Thread Index | Old Index