summaryrefslogtreecommitdiff
path: root/security/go-crypt/Makefile
diff options
context:
space:
mode:
authorspz <spz@pkgsrc.org>2019-02-08 11:31:19 +0000
committerspz <spz@pkgsrc.org>2019-02-08 11:31:19 +0000
commit5d2c1f12538853146107b701258c825acb701e66 (patch)
treebdbedb1b706d34ee984e7a0b16db7383b6df16af /security/go-crypt/Makefile
parent19b287caebd9b38fcb64a02fb2ae866253230dbd (diff)
downloadpkgsrc-5d2c1f12538853146107b701258c825acb701e66.tar.gz
Pullup ticket #5906 - requested by bsiegert
lang/go111: security update Revisions pulled up: - lang/go/version.mk 1.54 - lang/go111/distinfo 1.5 ------------------------------------------------------------------- Module Name: pkgsrc Committed By: bsiegert Date: Thu Jan 24 09:26:21 UTC 2019 Modified Files: pkgsrc/lang/go: version.mk pkgsrc/lang/go111: distinfo Log Message: Update go111 to 1.11.5 (security). This release addresses a recently supported security issue. This DoS vulnerability in the crypto/elliptic implementations of the P-521 and P-384 elliptic curves may let an attacker craft inputs that consume excessive amounts of CPU. These inputs might be delivered via TLS handshakes, X.509 certificates, JWT tokens, ECDH shares or ECDSA signatures. In some cases, if an ECDH private key is reused more than once, the attack can also lead to key recovery. The issue is CVE-2019-6486 and Go issue golang.org/issue/29903. See the Go issue for more details. To generate a diff of this commit: cvs rdiff -u -r1.53 -r1.54 pkgsrc/lang/go/version.mk cvs rdiff -u -r1.4 -r1.5 pkgsrc/lang/go111/distinfo
Diffstat (limited to 'security/go-crypt/Makefile')
0 files changed, 0 insertions, 0 deletions