pkgsrc/lang/go112
bsiegert d9b2ddcd40 go112: update to 1.12.8 (security release).
net/http: Denial of Service vulnerabilities in the HTTP/2 implementation

net/http and golang.org/x/net/http2 servers that accept direct connections from
untrusted clients could be remotely made to allocate an unlimited amount of
memory, until the program crashes. Servers will now close connections if the
send queue accumulates too many control messages.

The issues are CVE-2019-9512 and CVE-2019-9514, and Go issue golang.org/issue/33606.
Thanks to Jonathan Looney from Netflix for discovering and reporting these issues.

This is also fixed in version v0.0.0-20190813141303-74dc4d7220e7 of
golang.org/x/net/http2.

net/url: parsing validation issue

url.Parse would accept URLs with malformed hosts, such that the Host field
could have arbitrary suffixes that would appear in neither Hostname() nor
Port(), allowing authorization bypasses in certain applications. Note that URLs
with invalid, not numeric ports will now return an error from url.Parse.

The issue is CVE-2019-14809 and Go issue golang.org/issue/29098.
Thanks to Julian Hector and Nikolai Krein from Cure53, and Adi Cohen (adico.me)
for discovering and reporting this issue.
2019-08-14 15:42:52 +00:00
..
patches go112: Remove empty patch (NFC) 2019-03-14 08:15:19 +00:00
ALTERNATIVES
DESCR
distinfo go112: update to 1.12.8 (security release). 2019-08-14 15:42:52 +00:00
Makefile go112: update to 1.12.8 (security release). 2019-08-14 15:42:52 +00:00
PLIST Update go112 to 1.12.7. 2019-07-14 15:19:55 +00:00
PLIST.Linux
PLIST.OpenBSD
PLIST.SunOS go112: Sync PLIST.SunOS with reality. 2019-03-13 23:15:54 +00:00