pkgsrc/lang/go14
bsiegert 2508868dbb Update go14 to 1.4.3. It fixes four security-related issues.
The issues were reported in Go's net/http package. They affect programs using
that package to proxy HTTP requests. We recommend that all users upgrade to Go
1.5, which fixes these issues. For users unable to upgrade to Go 1.5, we have
released version 1.4.3, which is based on Go 1.4.2 plus fixes for these issues.
Affected Go programs—those that use the net/http package as a proxy server—must
be recompiled with Go 1.5 or Go 1.4.3 to receive the fixes.

The CVE issue descriptions and fixes are linked below.

CVE-2015-5739
"Content Length" treated as valid header:
https://go-review.googlesource.com/#/c/11772/

CVE-2015-5740
Double content-length headers does not return 400 error:
https://go-review.googlesource.com/#/c/11810/

CVE-2015-5741
Additional hardening, not sending Content-Length w/Transfer-Encoding,
Closing connections:
https://go-review.googlesource.com/#/c/11810/
https://go-review.googlesource.com/#/c/12865/
https://go-review.googlesource.com/#/c/13148/

The Go team would like to thank Jed Denlea and Régis Leroy for their
contributions to this release. They have been awarded 1337 USD under the Google
Security Bounty program.
2015-09-26 17:37:01 +00:00
..
patches Avoid undefined behavior when shifting negative integers. 2015-09-14 13:32:49 +00:00
DESCR
distinfo Update go14 to 1.4.3. It fixes four security-related issues. 2015-09-26 17:37:01 +00:00
Makefile Update go14 to 1.4.3. It fixes four security-related issues. 2015-09-26 17:37:01 +00:00
PLIST Update go14 to 1.4.3. It fixes four security-related issues. 2015-09-26 17:37:01 +00:00