Debian Package Tracker
Register | Log in
Subscribe

golang-github-docker-spdystream

multiplexed stream library using spdy

Choose email to subscribe with

general
  • source: golang-github-docker-spdystream (main)
  • version: 0.5.0-1
  • maintainer: Debian Go Packaging Team (DMD)
  • uploaders: Anthony Fok [DMD] – Tim Potter [DMD] – Dmitry Smirnov [DMD]
  • arch: all
  • std-ver: 4.5.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 0.2.0-1
  • oldstable: 0.2.0-1
  • stable: 0.5.0-1
  • testing: 0.5.0-1
  • unstable: 0.5.0-1
versioned links
  • 0.2.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.5.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • golang-github-docker-spdystream-dev
action needed
A new upstream version is available: 0.5.1 high
A new upstream version 0.5.1 is available, you should consider packaging it.
Created: 2026-04-15 Last update: 2026-04-21 02:00
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2026-35469: spdystream is a Go library for multiplexing streams over SPDY connections. In versions 0.5.0 and below, the SPDY/3 frame parser does not validate attacker-controlled counts and lengths before allocating memory. Three allocation paths are affected: the SETTINGS frame entry count, the header count in parseHeaderValueBlock, and individual header field sizes — all read as 32-bit integers and used directly as allocation sizes with no bounds checking. Because SPDY header blocks are zlib-compressed, a small on-the-wire payload can decompress into large attacker-controlled values. A remote peer that can send SPDY frames to a service using spdystream can exhaust process memory and cause an out-of-memory crash with a single crafted control frame. This issue has been fixed in version 0.5.1.
Created: 2026-04-16 Last update: 2026-04-17 12:31
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2026-35469: spdystream is a Go library for multiplexing streams over SPDY connections. In versions 0.5.0 and below, the SPDY/3 frame parser does not validate attacker-controlled counts and lengths before allocating memory. Three allocation paths are affected: the SETTINGS frame entry count, the header count in parseHeaderValueBlock, and individual header field sizes — all read as 32-bit integers and used directly as allocation sizes with no bounds checking. Because SPDY header blocks are zlib-compressed, a small on-the-wire payload can decompress into large attacker-controlled values. A remote peer that can send SPDY frames to a service using spdystream can exhaust process memory and cause an out-of-memory crash with a single crafted control frame. This issue has been fixed in version 0.5.1.
Created: 2026-04-16 Last update: 2026-04-17 12:31
1 low-priority security issue in trixie low

There is 1 open security issue in trixie.

1 issue left for the package maintainer to handle:
  • CVE-2026-35469: (needs triaging) spdystream is a Go library for multiplexing streams over SPDY connections. In versions 0.5.0 and below, the SPDY/3 frame parser does not validate attacker-controlled counts and lengths before allocating memory. Three allocation paths are affected: the SETTINGS frame entry count, the header count in parseHeaderValueBlock, and individual header field sizes — all read as 32-bit integers and used directly as allocation sizes with no bounds checking. Because SPDY header blocks are zlib-compressed, a small on-the-wire payload can decompress into large attacker-controlled values. A remote peer that can send SPDY frames to a service using spdystream can exhaust process memory and cause an out-of-memory crash with a single crafted control frame. This issue has been fixed in version 0.5.1.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-04-16 Last update: 2026-04-17 12:31
1 low-priority security issue in bookworm low

There is 1 open security issue in bookworm.

1 issue left for the package maintainer to handle:
  • CVE-2026-35469: (needs triaging) spdystream is a Go library for multiplexing streams over SPDY connections. In versions 0.5.0 and below, the SPDY/3 frame parser does not validate attacker-controlled counts and lengths before allocating memory. Three allocation paths are affected: the SETTINGS frame entry count, the header count in parseHeaderValueBlock, and individual header field sizes — all read as 32-bit integers and used directly as allocation sizes with no bounds checking. Because SPDY header blocks are zlib-compressed, a small on-the-wire payload can decompress into large attacker-controlled values. A remote peer that can send SPDY frames to a service using spdystream can exhaust process memory and cause an out-of-memory crash with a single crafted control frame. This issue has been fixed in version 0.5.1.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-04-16 Last update: 2026-04-17 12:31
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.5.1).
Created: 2021-08-18 Last update: 2026-03-31 15:01
news
[rss feed]
  • [2024-08-19] golang-github-docker-spdystream 0.5.0-1 MIGRATED to testing (Debian testing watch)
  • [2024-08-13] Accepted golang-github-docker-spdystream 0.5.0-1 (source) into unstable (Shengjing Zhu)
  • [2021-02-02] golang-github-docker-spdystream 0.2.0-1 MIGRATED to testing (Debian testing watch)
  • [2021-01-30] Accepted golang-github-docker-spdystream 0.2.0-1 (source) into unstable (Shengjing Zhu)
  • [2019-10-31] golang-github-docker-spdystream 0.0~git20181023.6480d4a-1 MIGRATED to testing (Debian testing watch)
  • [2019-10-28] Accepted golang-github-docker-spdystream 0.0~git20181023.6480d4a-1 (source) into unstable (Anthony Fok)
  • [2018-02-16] golang-github-docker-spdystream 0.0~git20151103.0.4d80814-2 MIGRATED to testing (Debian testing watch)
  • [2018-02-10] Accepted golang-github-docker-spdystream 0.0~git20151103.0.4d80814-2 (source) into unstable (Michael Stapelberg)
  • [2015-11-09] golang-github-docker-spdystream 0.0~git20151103.0.4d80814-1 MIGRATED to testing (Britney)
  • [2015-11-03] Accepted golang-github-docker-spdystream 0.0~git20151103.0.4d80814-1 (source all) into unstable, unstable (Dmitry Smirnov)
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 0.5.0-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing