summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorbsiegert <bsiegert@pkgsrc.org>2019-08-14 15:17:41 +0000
committerbsiegert <bsiegert@pkgsrc.org>2019-08-14 15:17:41 +0000
commitc620748da8e49b370c17b05e1ab98b56bf02d158 (patch)
treef1fae83a31ed65f9f95b944eaa0092b6a044ecdf
parent0bda9120db09d99d1380e819ef0168154d2061a7 (diff)
downloadpkgsrc-c620748da8e49b370c17b05e1ab98b56bf02d158.tar.gz
go111: update to 1.11.13 (security release).
net/http: Denial of Service vulnerabilities in the HTTP/2 implementation net/http and golang.org/x/net/http2 servers that accept direct connections from untrusted clients could be remotely made to allocate an unlimited amount of memory, until the program crashes. Servers will now close connections if the send queue accumulates too many control messages. The issues are CVE-2019-9512 and CVE-2019-9514, and Go issue golang.org/issue/33606. Thanks to Jonathan Looney from Netflix for discovering and reporting these issues. This is also fixed in version v0.0.0-20190813141303-74dc4d7220e7 of golang.org/x/net/http2. net/url: parsing validation issue url.Parse would accept URLs with malformed hosts, such that the Host field could have arbitrary suffixes that would appear in neither Hostname() nor Port(), allowing authorization bypasses in certain applications. Note that URLs with invalid, not numeric ports will now return an error from url.Parse. The issue is CVE-2019-14809 and Go issue golang.org/issue/29098. Thanks to Julian Hector and Nikolai Krein from Cure53, and Adi Cohen (adico.me) for discovering and reporting this issue.
-rw-r--r--lang/go/version.mk4
-rw-r--r--lang/go111/Makefile3
-rw-r--r--lang/go111/distinfo10
3 files changed, 8 insertions, 9 deletions
diff --git a/lang/go/version.mk b/lang/go/version.mk
index 8225764e709..3eeedbbe392 100644
--- a/lang/go/version.mk
+++ b/lang/go/version.mk
@@ -1,4 +1,4 @@
-# $NetBSD: version.mk,v 1.65 2019/07/14 15:19:55 bsiegert Exp $
+# $NetBSD: version.mk,v 1.66 2019/08/14 15:17:41 bsiegert Exp $
CTF_SUPPORTED= no
SSP_SUPPORTED= no
@@ -7,7 +7,7 @@ STRIP_DEBUG_SUPPORTED= no
.include "../../mk/bsd.prefs.mk"
GO112_VERSION= 1.12.7
-GO111_VERSION= 1.11.12
+GO111_VERSION= 1.11.13
GO110_VERSION= 1.10.8
GO19_VERSION= 1.9.7
GO14_VERSION= 1.4.3
diff --git a/lang/go111/Makefile b/lang/go111/Makefile
index b1a70a25bf8..ee1347f984e 100644
--- a/lang/go111/Makefile
+++ b/lang/go111/Makefile
@@ -1,6 +1,5 @@
-# $NetBSD: Makefile,v 1.5 2019/08/11 13:21:21 wiz Exp $
+# $NetBSD: Makefile,v 1.6 2019/08/14 15:17:41 bsiegert Exp $
-PKGREVISION= 1
.include "../../lang/go/version.mk"
DISTNAME= go${GO111_VERSION}.src
diff --git a/lang/go111/distinfo b/lang/go111/distinfo
index b627cc88a51..c5c283744c5 100644
--- a/lang/go111/distinfo
+++ b/lang/go111/distinfo
@@ -1,9 +1,9 @@
-$NetBSD: distinfo,v 1.9 2019/07/14 12:25:18 bsiegert Exp $
+$NetBSD: distinfo,v 1.10 2019/08/14 15:17:41 bsiegert Exp $
-SHA1 (go1.11.12.src.tar.gz) = 8a84f7eda08fbcc9b1c4f7133bb6cf13c774b4c0
-RMD160 (go1.11.12.src.tar.gz) = b2cdeab4dba28597782596a4abf59891f42cbcf1
-SHA512 (go1.11.12.src.tar.gz) = ff74678d7002be20c994702cc778d2447bbe4aad2ecf906e4cde9cf00c0c226c2f0def25146acd24f86fddf397b47602c1e5509c21b0d7b856cf933a05e19a6d
-Size (go1.11.12.src.tar.gz) = 21113396 bytes
+SHA1 (go1.11.13.src.tar.gz) = 3039af0d0714db1902059add729f6b36390a9776
+RMD160 (go1.11.13.src.tar.gz) = 19d71fb4c196bd5bb03cab40cc99b35f312aaefc
+SHA512 (go1.11.13.src.tar.gz) = a5dc8ec2bdad226e2498fdfb3560d6e7e19a84711cc1adb91675a8563a0b1fd153513397ca2a2b8cf266d718a6964ad143dfa588313dcf7fe350dd4a24efc3e9
+Size (go1.11.13.src.tar.gz) = 21114296 bytes
SHA1 (patch-misc_io_clangwrap.sh) = cd91c47ba0fe7b6eb8009dd261c0c26c7d581c29
SHA1 (patch-src_cmd_dist_util.go) = 24e6f1b6ded842a8ce322a40e8766f7d344bc47e
SHA1 (patch-src_cmd_link_internal_ld_elf.go) = 990a54e3baf239916e4c7f0c1d54240e2898601a