Debian Package Tracker
Register | Log in
Subscribe

golang-1.11

Choose email to subscribe with

general
  • source: golang-1.11 (updates)
  • version: 1.11.6-1+deb10u4
  • maintainer: Go Compiler Team (DMD)
  • uploaders: Michael Stapelberg [DMD] – Michael Hudson-Doyle [DMD] – Dr. Tobias Quathamer [DMD] – Tianon Gravi [DMD] – Paul Tagliamonte [DMD]
  • arch: all amd64 arm64 armel armhf i386 mips mips64el mipsel ppc64 ppc64el s390x
  • std-ver: 4.3.0
  • VCS: Git (Browse)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-bpo: 1.11.5-1~bpo9+1
  • oldstable: 1.11.6-1+deb10u4
  • old-sec: 1.11.6-1+deb10u4
versioned links
  • 1.11.5-1~bpo9+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.11.6-1+deb10u4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • golang-1.11
  • golang-1.11-doc
  • golang-1.11-go
  • golang-1.11-src
package is gone
This package is not in any development repository. This probably means that the package has been removed (or has been renamed). Thus the information here is of little interest ... the package is going to disappear unless someone takes it over and reintroduces it.
action needed
A new upstream version is available: 1.11.13 high
A new upstream version 1.11.13 is available, you should consider packaging it.
Created: 2020-06-29 Last update: 2022-05-17 23:32
22 low-priority security issues in buster low

There are 22 open security issues in buster.

21 issues left for the package maintainer to handle:
  • CVE-2020-24553: (needs triaging) Go before 1.14.8 and 1.15.x before 1.15.1 allows XSS because text/html is the default for CGI/FCGI handlers that lack a Content-Type header.
  • CVE-2020-28366: (needs triaging) Go before 1.14.12 and 1.15.x before 1.15.5 allows Code Injection.
  • CVE-2020-28367: (needs triaging) Go before 1.14.12 and 1.15.x before 1.15.5 allows Argument Injection.
  • CVE-2021-27918: (needs triaging) encoding/xml in Go before 1.15.9 and 1.16.x before 1.16.1 has an infinite loop if a custom TokenReader (for xml.NewTokenDecoder) returns EOF in the middle of an element. This can occur in the Decode, DecodeElement, or Skip method.
  • CVE-2021-29923: (needs triaging) Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR.
  • CVE-2021-31525: (needs triaging) net/http in Go before 1.15.12 and 1.16.x before 1.16.4 allows remote attackers to cause a denial of service (panic) via a large header to ReadRequest or ReadResponse. Server, Transport, and Client can each be affected in some configurations.
  • CVE-2021-33195: (needs triaging) Go before 1.15.13 and 1.16.x before 1.16.5 has functions for DNS lookups that do not validate replies from DNS servers, and thus a return value may contain an unsafe injection (e.g., XSS) that does not conform to the RFC1035 format.
  • CVE-2021-33196: (needs triaging) In archive/zip in Go before 1.15.13 and 1.16.x before 1.16.5, a crafted file count (in an archive's header) can cause a NewReader or OpenReader panic.
  • CVE-2021-33197: (needs triaging) In Go before 1.15.13 and 1.16.x before 1.16.5, some configurations of ReverseProxy (from net/http/httputil) result in a situation where an attacker is able to drop arbitrary headers.
  • CVE-2021-33198: (needs triaging) In Go before 1.15.13 and 1.16.x before 1.16.5, there can be a panic for a large exponent to the math/big.Rat SetString or UnmarshalText method.
  • CVE-2021-34558: (needs triaging) The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
  • CVE-2021-36221: (needs triaging) Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that can lead to a net/http/httputil ReverseProxy panic upon an ErrAbortHandler abort.
  • CVE-2021-38297: (needs triaging) Go before 1.16.9 and 1.17.x before 1.17.2 has a Buffer Overflow via large arguments in a function invocation from a WASM module, when GOARCH=wasm GOOS=js is used.
  • CVE-2021-39293: (needs triaging) In archive/zip in Go before 1.16.8 and 1.17.x before 1.17.1, a crafted archive header (falsely designating that many files are present) can cause a NewReader or OpenReader panic. NOTE: this issue exists because of an incomplete fix for CVE-2021-33196.
  • CVE-2021-41771: (needs triaging) ImportedSymbols in debug/macho (for Open or OpenFat) in Go before 1.16.10 and 1.17.x before 1.17.3 Accesses a Memory Location After the End of a Buffer, aka an out-of-bounds slice situation.
  • CVE-2021-44716: (needs triaging) net/http in Go before 1.16.12 and 1.17.x before 1.17.5 allows uncontrolled memory consumption in the header canonicalization cache via HTTP/2 requests.
  • CVE-2021-44717: (needs triaging) Go before 1.16.12 and 1.17.x before 1.17.5 on UNIX allows write operations to an unintended file or unintended network connection as a consequence of erroneous closing of file descriptor 0 after file-descriptor exhaustion.
  • CVE-2022-23772: (needs triaging) Rat.SetString in math/big in Go before 1.16.14 and 1.17.x before 1.17.7 has an overflow that can lead to Uncontrolled Memory Consumption.
  • CVE-2022-23773: (needs triaging) cmd/go in Go before 1.16.14 and 1.17.x before 1.17.7 can misinterpret branch names that falsely appear to be version tags. This can lead to incorrect access control if an actor is supposed to be able to create branches but not tags.
  • CVE-2022-23806: (needs triaging) Curve.IsOnCurve in crypto/elliptic in Go before 1.16.14 and 1.17.x before 1.17.7 can incorrectly return true in situations with a big.Int value that is not a valid field element.
  • CVE-2022-24921: (needs triaging) regexp.Compile in Go before 1.16.15 and 1.17.x before 1.17.8 allows stack exhaustion via a deeply nested expression.

You can find information about how to handle these issues in the security team's documentation.

1 ignored issue:
  • CVE-2021-3115: Go before 1.14.14 and 1.15.x before 1.15.7 on Windows is vulnerable to Command Injection and remote code execution when using the "go get" command to fetch modules that make use of cgo (for example, cgo can execute a gcc program from an untrusted download).
Created: 2021-02-19 Last update: 2022-05-12 21:30
news
[rss feed]
  • [2021-06-13] Accepted golang-1.11 1.11.6-1+deb10u4 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters)
  • [2021-02-08] Accepted golang-1.11 1.11.6-1+deb10u4 (source) into stable->embargoed, stable (Debian FTP Masters) (signed by: Shengjing Zhu)
  • [2019-10-29] Accepted golang-1.11 1.11.6-1+deb10u3 (source) into proposed-updates->stable-new, proposed-updates (Dr. Tobias Quathamer)
  • [2019-10-25] Accepted golang-1.11 1.11.6-1+deb10u3 (source) into stable->embargoed, stable (Dr. Tobias Quathamer)
  • [2019-09-28] Accepted golang-1.11 1.11.6-1+deb10u2 (source) into proposed-updates->stable-new, proposed-updates (Dr. Tobias Quathamer)
  • [2019-09-27] Accepted golang-1.11 1.11.6-1+deb10u2 (source) into stable->embargoed, stable (Dr. Tobias Quathamer)
  • [2019-08-26] golang-1.11 REMOVED from testing (Debian testing watch)
  • [2019-08-25] Removed 1.11.13-1 from unstable (Debian FTP Masters)
  • [2019-08-25] golang-1.11 1.11.13-1 MIGRATED to testing (Debian testing watch)
  • [2019-08-21] Accepted golang-1.11 1.11.6-1+deb10u1 (source) into proposed-updates->stable-new, proposed-updates (Dr. Tobias Quathamer)
  • [2019-08-18] Accepted golang-1.11 1.11.6-1+deb10u1 (source) into stable->embargoed, stable (Dr. Tobias Quathamer)
  • [2019-08-15] Accepted golang-1.11 1.11.13-1 (source) into unstable (Dr. Tobias Quathamer)
  • [2019-08-13] Accepted golang-1.11 1.11.12-4 (source) into unstable (Anthony Fok)
  • [2019-08-10] Accepted golang-1.11 1.11.12-3 (source all amd64) into unstable (Anthony Fok)
  • [2019-07-15] Accepted golang-1.11 1.11.12-2 (source) into unstable (Dr. Tobias Quathamer)
  • [2019-07-09] Accepted golang-1.11 1.11.12-1 (source) into unstable (Dr. Tobias Quathamer)
  • [2019-03-28] golang-1.11 1.11.6-1 MIGRATED to testing (Debian testing watch)
  • [2019-03-17] Accepted golang-1.11 1.11.6-1 (source) into unstable (Michael Hudson-Doyle)
  • [2019-01-29] Accepted golang-1.11 1.11.5-1~bpo9+1 (all amd64 source) into stretch-backports (Dr. Tobias Quathamer)
  • [2019-01-26] golang-1.11 1.11.5-1 MIGRATED to testing (Debian testing watch)
  • [2019-01-24] Accepted golang-1.11 1.11.5-1 (source) into unstable (Michael Stapelberg)
  • [2019-01-11] Accepted golang-1.11 1.11.4-4~bpo9+1 (all amd64 source) into stretch-backports, stretch-backports (Dr. Tobias Quathamer)
  • [2019-01-03] golang-1.11 1.11.4-4 MIGRATED to testing (Debian testing watch)
  • [2018-12-28] Accepted golang-1.11 1.11.4-4 (source) into unstable (Anthony Fok)
  • [2018-12-26] Accepted golang-1.11 1.11.4-3 (source) into unstable (Anthony Fok)
  • [2018-12-23] Accepted golang-1.11 1.11.4-2 (source) into unstable (Dr. Tobias Quathamer)
  • [2018-12-16] Accepted golang-1.11 1.11.4-1 (source) into unstable (Dr. Tobias Quathamer)
  • [2018-12-13] Accepted golang-1.11 1.11.3-1 (source) into unstable (Dr. Tobias Quathamer)
  • [2018-12-01] golang-1.11 1.11.2-2 MIGRATED to testing (Debian testing watch)
  • [2018-11-26] Accepted golang-1.11 1.11.2-2 (source) into unstable (Michael Hudson-Doyle)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • homepage
  • buildd: logs, clang, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing