golang-1.7 (1.7.4-2+deb9u2) stretch-security; urgency=high
authorThorsten Alteholz <debian@alteholz.de>
Fri, 20 Nov 2020 16:03:02 +0000 (16:03 +0000)
committerThorsten Alteholz <debian@alteholz.de>
Fri, 20 Nov 2020 16:03:02 +0000 (16:03 +0000)
commit9271e6e7410fd6de265c5d2b3951802721bcc7d2
treeb0b25e7bb43ab40760031af7e5ad94d0ef168559
parent58431a76751d1c93469f501ba36a5a04259f100d
parentacd35c4fe9497c1fadac7cf16174abcdd298d0c3
golang-1.7 (1.7.4-2+deb9u2) stretch-security; urgency=high

  * Non-maintainer upload by the LTS Team.
  * CVE-2020-15586
    Using the 100-continue in HTTP headers received by a net/http/Server
    can lead to a data race involving the connection's buffered writer.
  * CVE-2020-16845
    Certain invalid inputs to ReadUvarint or ReadVarint could cause those
    functions to read an unlimited number of bytes from the ByteReader
    argument before returning an error.

[dgit import unpatched golang-1.7 1.7.4-2+deb9u2]
33 files changed:
debian/changelog
debian/compat
debian/control
debian/control.in
debian/copyright
debian/docs
debian/gbp.conf
debian/gbp.conf.in
debian/golang-X.Y-doc.dirs
debian/golang-X.Y-doc.install
debian/golang-X.Y-doc.links
debian/golang-X.Y-doc.lintian-overrides
debian/golang-X.Y-go.dirs
debian/golang-X.Y-go.install
debian/golang-X.Y-go.links
debian/golang-X.Y-go.lintian-overrides
debian/golang-X.Y-go.postinst
debian/golang-X.Y-src.install
debian/golang-X.Y-src.lintian-overrides
debian/helpers/goenv.sh
debian/patches/CVE-2020-15586.patch
debian/patches/CVE-2020-16845.patch
debian/patches/cl-29995--tzdata-2016g.patch
debian/patches/cl-37964--tzdata-2017a.patch
debian/patches/cve-2018-7187.patch
debian/patches/cve-2019-6486.patch
debian/patches/series
debian/rules
debian/source/format
debian/source/lintian-overrides
debian/source/lintian-overrides.in
debian/watch
debian/watch.in