pkgsrc/lang/go
bsiegert 2508868dbb Update go14 to 1.4.3. It fixes four security-related issues.
The issues were reported in Go's net/http package. They affect programs using
that package to proxy HTTP requests. We recommend that all users upgrade to Go
1.5, which fixes these issues. For users unable to upgrade to Go 1.5, we have
released version 1.4.3, which is based on Go 1.4.2 plus fixes for these issues.
Affected Go programs—those that use the net/http package as a proxy server—must
be recompiled with Go 1.5 or Go 1.4.3 to receive the fixes.

The CVE issue descriptions and fixes are linked below.

CVE-2015-5739
"Content Length" treated as valid header:
https://go-review.googlesource.com/#/c/11772/

CVE-2015-5740
Double content-length headers does not return 400 error:
https://go-review.googlesource.com/#/c/11810/

CVE-2015-5741
Additional hardening, not sending Content-Length w/Transfer-Encoding,
Closing connections:
https://go-review.googlesource.com/#/c/11810/
https://go-review.googlesource.com/#/c/12865/
https://go-review.googlesource.com/#/c/13148/

The Go team would like to thank Jed Denlea and Régis Leroy for their
contributions to this release. They have been awarded 1337 USD under the Google
Security Bounty program.
2015-09-26 17:37:01 +00:00
..
patches Remove patch for a problem that was fixed in 1.5.1. 2015-09-13 19:11:55 +00:00
DESCR
distinfo Remove patch for a problem that was fixed in 1.5.1. 2015-09-13 19:11:55 +00:00
go-package.mk Actually define the GO_PLATFORM var before using it. Fixes PLIST generation 2015-05-11 13:25:35 +00:00
Makefile Remove patch for a problem that was fixed in 1.5.1. 2015-09-13 19:11:55 +00:00
PLIST Update Go to 1.5.1. 2015-09-13 14:24:58 +00:00
version.mk Update go14 to 1.4.3. It fixes four security-related issues. 2015-09-26 17:37:01 +00:00