pkgsrc/lang/go112
bsiegert 56d839292e Update go112 to 1.12.16 (security release).
Panic in crypto/x509 certificate parsing and golang.org/x/crypto/cryptobyte

On 32-bit architectures, a malformed input to crypto/x509 or the ASN.1 parsing
functions of golang.org/x/crypto/cryptobyte can lead to a panic.

The malformed certificate can be delivered via a crypto/tls connection to a
client, or to a server that accepts client certificates. net/http clients can
be made to crash by an HTTPS server, while net/http servers that accept client
certificates will recover the panic and are unaffected.

Thanks to Project Wycheproof for providing the test cases that led to the
discovery of this issue.

The issue is CVE-2020-7919 and Go issue golang.org/issue/36837.

This is also fixed in version v0.0.0-20200124225646-8b5121be2f68 of
golang.org/x/crypto/cryptobyte.
2020-02-02 09:26:39 +00:00
..
patches go112: Remove empty patch (NFC) 2019-03-14 08:15:19 +00:00
ALTERNATIVES
DESCR
distinfo Update go112 to 1.12.16 (security release). 2020-02-02 09:26:39 +00:00
Makefile all: migrate homepages from http to https 2020-01-26 17:30:40 +00:00
PLIST Update go112 to 1.12.14. 2019-12-13 07:39:33 +00:00
PLIST.Linux
PLIST.OpenBSD
PLIST.SunOS go112: Sync PLIST.SunOS with reality. 2019-03-13 23:15:54 +00:00