Debian Package Tracker
Register | Log in
Subscribe

golang-1.19

Go programming language compiler - metapackage

Choose email to subscribe with

general
  • source: golang-1.19 (main)
  • version: 1.19.8-2
  • maintainer: Debian Go Compiler Team (DMD)
  • uploaders: Paul Tagliamonte [DMD] – Tianon Gravi [DMD] – Dr. Tobias Quathamer [DMD] – Michael Hudson-Doyle [DMD] – Anthony Fok [DMD] – Michael Stapelberg [DMD]
  • arch: all amd64 arm64 armel armhf i386 mips mips64el mipsel ppc64 ppc64el s390x
  • std-ver: 4.6.1
  • VCS: Git (Browse)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • old-bpo: 1.19.8-2~bpo11+1
  • stable: 1.19.8-2
versioned links
  • 1.19.8-2~bpo11+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.19.8-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • golang-1.19
  • golang-1.19-doc
  • golang-1.19-go
  • golang-1.19-src
package is gone
This package is not in any development repository. This probably means that the package has been removed (or has been renamed). Thus the information here is of little interest ... the package is going to disappear unless someone takes it over and reintroduces it.
action needed
A new upstream version is available: 1.19.13 high
A new upstream version 1.19.13 is available, you should consider packaging it.
Created: 2023-12-03 Last update: 2025-07-03 03:30
lintian reports 6 errors and 50 warnings high
Lintian reports 6 errors and 50 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2024-03-28 Last update: 2024-10-05 00:33
4 security issues in trixie high

There are 4 open security issues in trixie.

4 important issues:
  • CVE-2023-39318: The html/template package does not properly handle HTML-like "" comment tokens, nor hashbang "#!" comment tokens, in <script> contexts. This may cause the template parser to improperly interpret the contents of <script> contexts, causing actions to be improperly escaped. This may be leveraged to perform an XSS attack.
  • CVE-2023-39319: The html/template package does not apply the proper rules for handling occurrences of "<script", "<!--", and "</script" within JS literals in <script> contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack.
  • CVE-2023-39323: Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.
  • CVE-2023-39325: A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function.
Created: 2023-09-07 Last update: 2023-12-02 23:58
4 security issues in sid high

There are 4 open security issues in sid.

4 important issues:
  • CVE-2023-39318: The html/template package does not properly handle HTML-like "" comment tokens, nor hashbang "#!" comment tokens, in <script> contexts. This may cause the template parser to improperly interpret the contents of <script> contexts, causing actions to be improperly escaped. This may be leveraged to perform an XSS attack.
  • CVE-2023-39319: The html/template package does not apply the proper rules for handling occurrences of "<script", "<!--", and "</script" within JS literals in <script> contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack.
  • CVE-2023-39323: Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.
  • CVE-2023-39325: A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function.
Created: 2023-09-07 Last update: 2023-11-14 01:29
35 low-priority security issues in bookworm low

There are 35 open security issues in bookworm.

35 issues left for the package maintainer to handle:
  • CVE-2025-4673: (needs triaging) Proxy-Authorization and Proxy-Authenticate headers persisted on cross-origin redirects potentially leaking sensitive information.
  • CVE-2023-24531: (needs triaging) Command go env is documented as outputting a shell script containing the Go environment. However, go env doesn't sanitize values, so executing its output as a shell script can cause various bad bahaviors, including executing arbitrary commands or inserting new environment variables. This issue is relatively minor because, in general, if an attacker can set arbitrary environment variables on a system, they have better attack vectors than making "go env" print them out.
  • CVE-2023-24539: (needs triaging) Angle brackets (<>) are not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character can result in unexpectedly closing the CSS context and allowing for injection of unexpected HTML, if executed with untrusted input.
  • CVE-2023-24540: (needs triaging) Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.
  • CVE-2023-29400: (needs triaging) Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags.
  • CVE-2023-29402: (needs triaging) The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved using the go command, i.e. via "go get", are not affected (modules retrieved using GOPATH-mode, i.e. GO111MODULE=off, may be affected).
  • CVE-2023-29403: (needs triaging) On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.
  • CVE-2023-29404: (needs triaging) The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.
  • CVE-2023-29405: (needs triaging) The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.
  • CVE-2023-29406: (needs triaging) The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.
  • CVE-2023-29409: (needs triaging) Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.
  • CVE-2023-39318: (needs triaging) The html/template package does not properly handle HTML-like "" comment tokens, nor hashbang "#!" comment tokens, in <script> contexts. This may cause the template parser to improperly interpret the contents of <script> contexts, causing actions to be improperly escaped. This may be leveraged to perform an XSS attack.
  • CVE-2023-39319: (needs triaging) The html/template package does not apply the proper rules for handling occurrences of "<script", "<!--", and "</script" within JS literals in <script> contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack.
  • CVE-2023-39323: (needs triaging) Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.
  • CVE-2023-39325: (needs triaging) A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function.
  • CVE-2023-39326: (needs triaging) A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.
  • CVE-2023-45285: (needs triaging) Using go get to fetch a module with the ".git" suffix may unexpectedly fallback to the insecure "git://" protocol if the module is unavailable via the secure "https://" and "git+ssh://" protocols, even if GOINSECURE is not set for said module. This only affects users who are not using the module proxy and are fetching modules directly (i.e. GOPROXY=off).
  • CVE-2023-45287: (needs triaging) Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.
  • CVE-2023-45288: (needs triaging) An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.
  • CVE-2023-45289: (needs triaging) When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.
  • CVE-2023-45290: (needs triaging) When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.
  • CVE-2024-24783: (needs triaging) Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.
  • CVE-2024-24784: (needs triaging) The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions being made by programs using different parsers.
  • CVE-2024-24785: (needs triaging) If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.
  • CVE-2024-24789: (needs triaging) The archive/zip package's handling of certain types of invalid zip files differs from the behavior of most zip implementations. This misalignment could be exploited to create an zip file with contents that vary depending on the implementation reading the file. The archive/zip package now rejects files containing these errors.
  • CVE-2024-24790: (needs triaging) The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for IPv4-mapped IPv6 addresses, returning false for addresses which would return true in their traditional IPv4 forms.
  • CVE-2024-24791: (needs triaging) The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.
  • CVE-2024-34155: (needs triaging) Calling any of the Parse functions on Go source code which contains deeply nested literals can cause a panic due to stack exhaustion.
  • CVE-2024-34156: (needs triaging) Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.
  • CVE-2024-34158: (needs triaging) Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.
  • CVE-2024-45336: (needs triaging) The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.
  • CVE-2024-45341: (needs triaging) A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs.
  • CVE-2025-22866: (needs triaging) Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.
  • CVE-2025-22870: (needs triaging) Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.
  • CVE-2025-22871: (needs triaging) The net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines. This can permit request smuggling if a net/http server is used in conjunction with a server that incorrectly accepts a bare LF as part of a chunk-ext.

You can find information about how to handle these issues in the security team's documentation.

Created: 2023-06-07 Last update: 2025-06-15 17:00
debian/patches: 3 patches to forward upstream low

Among the 4 debian patches available in version 1.19.6-2 of the package, we noticed the following issues:

  • 3 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2024-03-28 12:31
news
[rss feed]
  • [2023-12-03] golang-1.19 REMOVED from testing (Debian testing watch)
  • [2023-12-02] Removed 1.19.13-1 from unstable (Debian FTP Masters)
  • [2023-11-27] Accepted golang-1.19 1.19.13-1~bpo11+1 (source) into oldstable-backports-sloppy (Debian FTP Masters) (signed by: Anthony Fok)
  • [2023-11-13] Accepted golang-1.19 1.19.13-1~bpo12+1 (source) into stable-backports (Anthony Fok)
  • [2023-09-09] golang-1.19 1.19.13-1 MIGRATED to testing (Debian testing watch)
  • [2023-09-07] Accepted golang-1.19 1.19.13-1 (source) into unstable (Shengjing Zhu)
  • [2023-09-06] Accepted golang-1.19 1.19.12-2~bpo11+1 (source all amd64) into oldstable-backports-sloppy (Debian FTP Masters) (signed by: Anthony Fok)
  • [2023-09-05] Accepted golang-1.19 1.19.12-2~bpo12+1 (source all amd64) into stable-backports (Debian FTP Masters) (signed by: Anthony Fok)
  • [2023-08-07] golang-1.19 1.19.12-2 MIGRATED to testing (Debian testing watch)
  • [2023-08-04] golang-1.19 1.19.12-1 MIGRATED to testing (Debian testing watch)
  • [2023-08-04] Accepted golang-1.19 1.19.12-2 (source) into unstable (Shengjing Zhu)
  • [2023-08-02] Accepted golang-1.19 1.19.12-1 (source) into unstable (Shengjing Zhu)
  • [2023-07-14] golang-1.19 1.19.11-1 MIGRATED to testing (Debian testing watch)
  • [2023-07-12] Accepted golang-1.19 1.19.11-1 (source) into unstable (Shengjing Zhu)
  • [2023-06-20] golang-1.19 1.19.10-2 MIGRATED to testing (Debian testing watch)
  • [2023-06-15] Accepted golang-1.19 1.19.10-2 (source) into unstable (Shengjing Zhu)
  • [2023-06-07] Accepted golang-1.19 1.19.10-1 (source) into experimental (Shengjing Zhu)
  • [2023-05-03] Accepted golang-1.19 1.19.9-1 (source) into experimental (Shengjing Zhu)
  • [2023-04-12] Accepted golang-1.19 1.19.8-2~bpo11+1 (source) into bullseye-backports (Anthony Fok)
  • [2023-04-09] golang-1.19 1.19.8-2 MIGRATED to testing (Debian testing watch)
  • [2023-04-07] Accepted golang-1.19 1.19.8-2 (source) into unstable (Shengjing Zhu)
  • [2023-04-04] Accepted golang-1.19 1.19.8-1 (source) into experimental (Shengjing Zhu)
  • [2023-03-08] Accepted golang-1.19 1.19.7-1 (source) into experimental (Shengjing Zhu)
  • [2023-02-27] golang-1.19 1.19.6-2 MIGRATED to testing (Debian testing watch)
  • [2023-02-23] Accepted golang-1.19 1.19.6-2~bpo11+1 (source) into bullseye-backports (Anthony Fok)
  • [2023-02-17] Accepted golang-1.19 1.19.6-2 (source) into unstable (Shengjing Zhu)
  • [2023-02-15] Accepted golang-1.19 1.19.6-1 (source) into experimental (Shengjing Zhu)
  • [2023-01-30] Accepted golang-1.19 1.19.5-1~bpo11+1 (source) into bullseye-backports (Anthony Fok)
  • [2023-01-24] golang-1.19 1.19.5-1 MIGRATED to testing (Debian testing watch)
  • [2023-01-19] Accepted golang-1.19 1.19.5-1 (source) into unstable (Shengjing Zhu)
  • 1
  • 2
bugs [bug history graph]
  • all: 1
  • RC: 1
  • I&N: 0
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (6, 50)
  • buildd: logs, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
  • debci

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing