-
golang-1.13 (1.13.8-1ubuntu2.22.04.2) jammy-security; urgency=medium
* SECURITY UPDATE: http request smuggling issue
- debian/patches/CVE-2022-1705.patch: don't strip whitespace from
Transfer-Encoding headers.
- CVE-2022-1705
* SECURITY UPDATE: DoS issue due to panic
- debian/patches/CVE-2022-27664.patch: update bundled golang.org/x/net/http2.
- debian/patches/CVE-2022-28131.patch: use iterative Skip, rather than
recursive.
- debian/patches/CVE-2022-30631.patch: fix stack exhaustion bug in
Reader.Read.
- debian/patches/CVE-2022-30632.patch: fix stack exhaustion in Glob.
- debian/patches/CVE-2022-30633.patch: limit depth of nesting in unmarshal.
- debian/patches/CVE-2022-30635.patch: add a depth limit for ignored fields.
- debian/patches/CVE-2022-32189.patch: check buffer lengths in GobDecode.
- debian/patches/CVE-2022-41717.patch: update bundled golang.org/x/net/http2.
- debian/patches/CVE-2023-24534.patch: avoid overpredicting the number of
MIME header keys.
- CVE-2022-27664
- CVE-2022-28131
- CVE-2022-30631
- CVE-2022-30632
- CVE-2022-30633
- CVE-2022-30635
- CVE-2022-32189
- CVE-2022-41717
- CVE-2023-24534
* SECURITY UPDATE: out-of-bound read issue
- debian/patches/CVE-2022-2879.patch: limit size of headers.
- debian/source/include-binaries: add test file bz2
pax-bad-hdr-large.tar.bz2.
- CVE-2022-2879
* SECURITY UPDATE: query parameter smuggling issue in Go proxy
- debian/patches/CVE-2022-2880-pre.patch: reject query values with
semicolons.
- debian/patches/CVE-2022-2880.patch: avoid query parameter smuggling.
- CVE-2022-2880
* SECURITY UPDATE: tls session takeover vulnerability
- debian/patches/CVE-2022-30629.patch: randomly generate ticket_age_add.
- CVE-2022-30629
* SECURITY UPDATE: sensitive information exposure
- debian/patches/CVE-2022-32148.patch: preserve nil values in Header.Clone.
- CVE-2022-32148
* SECURITY UPDATE: integer overflow issue
- debian/patches/CVE-2023-24537.patch: reject large line and column number
in //line directives.
- CVE-2023-24537
* SECURITY UPDATE: code injection vulnerability
- debian/patches/CVE-2023-24538.patch: disallow actions in JS template
literals.
- CVE-2023-24538
-- David Fernandez Gonzalez <email address hidden> Wed, 03 Jan 2024 17:12:49 +0100
-
golang-1.13 (1.13.8-1ubuntu2.22.04.1) jammy-security; urgency=medium
* SECURITY UPDATE: Infinite read loop via invalid inputs
- debian/patches/CVE-2020-16845.patch: ensure that ReadUvarint
reads a limited amount of data in src/encoding/binary/varint.go.
- CVE-2020-16845
* debian/control.in: Add gcc-10 and g++-10 as gcc-11 and g++-11 are
the new default versions. DWARF5 is not compatible and is used by
11 versions.
* debian/rules: Enforce the use of gcc-10 and g++-10.
-- David Fernandez Gonzalez <email address hidden> Wed, 09 Nov 2022 16:10:42 +0100
-
golang-1.13 (1.13.8-1ubuntu2) groovy; urgency=medium
* Apply applicable parts of https://go-review.googlesource.com/c/go/+/262357/
to fix build on arm64.
-- Michael Hudson-Doyle <email address hidden> Thu, 15 Oct 2020 21:55:17 +1300