Hi gophers,

We have just released Go versions 1.17.3 and 1.16.10, minor point releases.

These minor releases include two security fixes following the security
policy <https://golang.org/security>:

   -

   archive/zip: don't panic on (*Reader).Open

Reader.Open (the API implementing io/fs.FS introduced in Go 1.16) can be
made to panic by an attacker providing either a crafted ZIP archive
containing completely invalid names or an empty filename argument.

Thank you to Colin Arnott, SiteHost and Noah Santschi-Cooney, Sourcegraph
Code Intelligence Team for reporting this issue.

This is CVE-2021-41772 and Go issue golang.org/issue/48085
<https://github.com/golang/go/issues/48085>.

   -

   debug/macho: invalid dynamic symbol table command can cause panic

Malformed binaries parsed using Open or OpenFat can cause a panic when
calling ImportedSymbols, due to an out-of-bounds slice operation.

Thanks to Burak Çarıkçı - Yunus Yıldırım (CT-Zer0 Crypttech) for reporting
this issue

This is CVE-2021-41771 and Go issue golang.org/issue/48990
<https://github.com/golang/go/issues/48990>.

View the release notes for more information:

    https://golang.org/doc/devel/release.html#go1.17.minor

You can download binary and source distributions from the Go web site:

    https://golang.org/dl/

To compile from source using a Git clone, update to the release with

"git checkout go1.17.3" and build as usual.

Thanks to everyone who contributed to the releases.

Cheers,

Than and Dmitri for the Go team

-- 
You received this message because you are subscribed to the Google Groups 
"golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to golang-nuts+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/golang-nuts/CA%2BUr55HQdo%3Di0MRK_sBKd4U1_65DqRq2089wStKGtmuqweqjHQ%40mail.gmail.com.

Reply via email to