Skip to content

AppVeyor: update to go 1.12.8 (CVE-2019-9512, CVE-2019-9514)#3531

Merged
crosbymichael merged 1 commit intocontainerd:masterfrom
thaJeztah:bump_golang_1.12.8
Aug 14, 2019
Merged

AppVeyor: update to go 1.12.8 (CVE-2019-9512, CVE-2019-9514)#3531
crosbymichael merged 1 commit intocontainerd:masterfrom
thaJeztah:bump_golang_1.12.8

Conversation

@thaJeztah
Copy link
Copy Markdown
Member

go1.12.8 (released 2019/08/13) includes security fixes to the net/http and net/url packages.
See the Go 1.12.8 milestone on our issue tracker for details:

https://github.com/golang/go/issues?q=milestone%3AGo1.12.8

  • net/http: Denial of Service vulnerabilities in the HTTP/2 implementation
    net/http and golang.org/x/net/http2 servers that accept direct connections from untrusted
    clients could be remotely made to allocate an unlimited amount of memory, until the program
    crashes. Servers will now close connections if the send queue accumulates too many control
    messages.
    The issues are CVE-2019-9512 and CVE-2019-9514, and Go issue golang.org/issue/33606.
    Thanks to Jonathan Looney from Netflix for discovering and reporting these issues.
    This is also fixed in version v0.0.0-20190813141303-74dc4d7220e7 of golang.org/x/net/http2.
    net/url: parsing validation issue
  • url.Parse would accept URLs with malformed hosts, such that the Host field could have arbitrary
    suffixes that would appear in neither Hostname() nor Port(), allowing authorization bypasses
    in certain applications. Note that URLs with invalid, not numeric ports will now return an error
    from url.Parse.
    The issue is CVE-2019-14809 and Go issue golang.org/issue/29098.
    Thanks to Julian Hector and Nikolai Krein from Cure53, and Adi Cohen (adico.me) for discovering
    and reporting this issue.

go1.12.8 (released 2019/08/13) includes security fixes to the net/http and net/url packages.
See the Go 1.12.8 milestone on our issue tracker for details:

https://github.com/golang/go/issues?q=milestone%3AGo1.12.8

- net/http: Denial of Service vulnerabilities in the HTTP/2 implementation
  net/http and golang.org/x/net/http2 servers that accept direct connections from untrusted
  clients could be remotely made to allocate an unlimited amount of memory, until the program
  crashes. Servers will now close connections if the send queue accumulates too many control
  messages.
  The issues are CVE-2019-9512 and CVE-2019-9514, and Go issue golang.org/issue/33606.
  Thanks to Jonathan Looney from Netflix for discovering and reporting these issues.
  This is also fixed in version v0.0.0-20190813141303-74dc4d7220e7 of golang.org/x/net/http2.
  net/url: parsing validation issue
- url.Parse would accept URLs with malformed hosts, such that the Host field could have arbitrary
  suffixes that would appear in neither Hostname() nor Port(), allowing authorization bypasses
  in certain applications. Note that URLs with invalid, not numeric ports will now return an error
  from url.Parse.
  The issue is CVE-2019-14809 and Go issue golang.org/issue/29098.
  Thanks to Julian Hector and Nikolai Krein from Cure53, and Adi Cohen (adico.me) for discovering
  and reporting this issue.

Signed-off-by: Sebastiaan van Stijn <[email protected]>
@theopenlab-ci
Copy link
Copy Markdown

theopenlab-ci Bot commented Aug 14, 2019

Build succeeded.

@fuweid
Copy link
Copy Markdown
Member

fuweid commented Aug 14, 2019

and also fix the issue: #3481

@thaJeztah
Copy link
Copy Markdown
Member Author

and also fix the issue: #3481

I can add closes #3481 here; I guess it would still need packages to be built with Go 1.12.8 though (I'm working on updating packaging scripts for Docker's containerd.io package)

@codecov-io
Copy link
Copy Markdown

Codecov Report

Merging #3531 into master will not change coverage.
The diff coverage is n/a.

Impacted file tree graph

@@           Coverage Diff           @@
##           master    #3531   +/-   ##
=======================================
  Coverage   44.94%   44.94%           
=======================================
  Files         115      115           
  Lines       12790    12790           
=======================================
  Hits         5748     5748           
  Misses       6170     6170           
  Partials      872      872
Flag Coverage Δ
#linux 48.77% <ø> (ø) ⬆️
#windows 40.18% <ø> (-0.02%) ⬇️

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update b77e25d...1b389b3. Read the comment docs.

@crosbymichael
Copy link
Copy Markdown
Member

LGTM

@crosbymichael crosbymichael merged commit 074b759 into containerd:master Aug 14, 2019
@thaJeztah thaJeztah deleted the bump_golang_1.12.8 branch August 14, 2019 18:15
@AkihiroSuda AkihiroSuda mentioned this pull request Dec 14, 2019
16 tasks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants