summaryrefslogtreecommitdiff
path: root/www/py-cookies
diff options
context:
space:
mode:
authorbsiegert <bsiegert@pkgsrc.org>2018-02-08 19:32:17 +0000
committerbsiegert <bsiegert@pkgsrc.org>2018-02-08 19:32:17 +0000
commit34c7bbeb3d9415830da8a4c5981d63d84467d362 (patch)
treebf5a2647a96484157b0dc25b3898707514b1ccc8 /www/py-cookies
parented99eaae68a6592c3a0421adf1bd61bbb70dd26d (diff)
downloadpkgsrc-34c7bbeb3d9415830da8a4c5981d63d84467d362.tar.gz
Update Go to 1.9.4.
By using the clang or gcc plugin mechanism, it was possible for an attacker to trick the “go get” command into executing arbitrary code. The go command now restricts the set of allowed host compiler and linker arguments in cgo source files to a list of allowed flags, in particular disallowing -fplugin= and -plugin=. The issue is CVE-2018-6574 and Go issue golang.org/issue/23672. See the Go issue for details. Thanks to Christopher Brown of Mattermost for reporting this problem.
Diffstat (limited to 'www/py-cookies')
0 files changed, 0 insertions, 0 deletions