Hi gophers,

We have just released Go 1.12.8 and Go 1.11.13 to address recently reported
security issues. We recommend that all users update to one of these
releases (if you’re not sure which, choose Go 1.12.8).

   - net/http: Denial of Service vulnerabilities in the HTTP/2
   implementation

   net/http and golang.org/x/net/http2 servers that accept direct
   connections from untrusted clients could be remotely made to allocate an
   unlimited amount of memory, until the program crashes. Servers will now
   close connections if the send queue accumulates too many control messages.
   The issues are CVE-2019-9512 and CVE-2019-9514, and Go issue
   golang.org/issue/33606.
   Thanks to Jonathan Looney from Netflix for discovering and reporting
   these issues.

   This is also fixed in version v0.0.0-20190813141303-74dc4d7220e7 of
   golang.org/x/net/http2.


   - net/url: parsing validation issue

   url.Parse would accept URLs with malformed hosts, such that the Host
   field could have arbitrary suffixes that would appear in neither Hostname()
   nor Port(), allowing authorization bypasses in certain applications. Note
   that URLs with invalid, not numeric ports will now return an error from
   url.Parse.
   The issue is CVE-2019-14809 and Go issue golang.org/issue/29098.
   Thanks to Julian Hector and Nikolai Krein from Cure53, and Adi Cohen (
   adico.me) for discovering and reporting this issue.

Downloads are available at https://golang.org/dl for all supported
platforms.

Thank you,
Dmitri on behalf of the Go team

-- 
You received this message because you are subscribed to the Google Groups 
"golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to golang-nuts+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/golang-nuts/CA%2BON-PEjQFgeSCRenLKgW7LzBfLV8Gk368-85rGde-LC-8O3Ag%40mail.gmail.com.

Reply via email to