golang-1.7 (1.7.4-2+deb9u3) stretch-security; urgency=high
authorSylvain Beucler <beuc@debian.org>
Sat, 13 Mar 2021 14:48:57 +0000 (14:48 +0000)
committerSylvain Beucler <beuc@debian.org>
Sat, 13 Mar 2021 14:48:57 +0000 (14:48 +0000)
commit25ff4529111e57b1de7977048e03038e91e12fb2
treee5c49aaccc557ed5fdb41bb36849e86a19c6db69
parent58431a76751d1c93469f501ba36a5a04259f100d
parente44ea571286d3a85ecaf4ef882c06d886fda945a
golang-1.7 (1.7.4-2+deb9u3) stretch-security; urgency=high

  * Non-maintainer upload by the LTS Security Team.
  * CVE-2017-15041: Go allows "go get" remote command execution. Using
    custom domains, it is possible to arrange things so that
    example.com/pkg1 points to a Subversion repository but
    example.com/pkg1/pkg2 points to a Git repository. If the Subversion
    repository includes a Git checkout in its pkg2 directory and some
    other work is done to ensure the proper ordering of operations, "go
    get" can be tricked into reusing this Git checkout for the fetch of
    code from pkg2. If the Subversion repository's Git checkout has
    malicious commands in .git/hooks/, they will execute on the system
    running "go get."
  * CVE-2018-16873: the "go get" command is vulnerable to remote code
    execution when executed with the -u flag and the import path of a
    malicious Go package, as it may treat the parent directory as a Git
    repository root, containing malicious configuration.
  * CVE-2018-16874: the "go get" command is vulnerable to directory
    traversal when executed with the import path of a malicious Go package
    which contains curly braces (both '{' and '}' characters). The
    attacker can cause an arbitrary filesystem write, which can lead to
    code execution.
  * CVE-2019-9741: in net/http, CRLF injection is possible if the attacker
    controls a url parameter, as demonstrated by the second argument to
    http.NewRequest with \r\n followed by an HTTP header or a Redis
    command.
  * CVE-2019-16276: Go allows HTTP Request Smuggling.
  * CVE-2019-17596: Go can panic upon an attempt to process network
    traffic containing an invalid DSA public key. There are several attack
    scenarios, such as traffic from a client to a server that verifies
    client certificates.
  * CVE-2021-3114: crypto/elliptic/p224.go can generate incorrect outputs,
    related to an underflow of the lowest limb during the final complete
    reduction in the P-224 field.

[dgit import unpatched golang-1.7 1.7.4-2+deb9u3]
39 files changed:
debian/changelog
debian/compat
debian/control
debian/control.in
debian/copyright
debian/docs
debian/gbp.conf
debian/gbp.conf.in
debian/golang-X.Y-doc.dirs
debian/golang-X.Y-doc.install
debian/golang-X.Y-doc.links
debian/golang-X.Y-doc.lintian-overrides
debian/golang-X.Y-go.dirs
debian/golang-X.Y-go.install
debian/golang-X.Y-go.links
debian/golang-X.Y-go.lintian-overrides
debian/golang-X.Y-go.postinst
debian/golang-X.Y-src.install
debian/golang-X.Y-src.lintian-overrides
debian/helpers/goenv.sh
debian/patches/CVE-2017-15041.patch
debian/patches/CVE-2018-16873,16874.patch
debian/patches/CVE-2019-16276.patch
debian/patches/CVE-2019-17596.patch
debian/patches/CVE-2019-9741.patch
debian/patches/CVE-2020-15586.patch
debian/patches/CVE-2020-16845.patch
debian/patches/CVE-2021-3114.patch
debian/patches/cl-29995--tzdata-2016g.patch
debian/patches/cl-37964--tzdata-2017a.patch
debian/patches/cve-2018-7187.patch
debian/patches/cve-2019-6486.patch
debian/patches/series
debian/rules
debian/source/format
debian/source/lintian-overrides
debian/source/lintian-overrides.in
debian/watch
debian/watch.in