from ${URL}: Hello OSS Security Community, The Go open source project has received notification of an HTTP request smuggling vulnerability in the net/http library ( http://golang.org/pkg/net/http/). The vulnerability was identified in the 1.4.2 release version (http://golang.org/dl) and in the 1.5 release branch. Patches have already been applied to the 1.5 release branch, and will be ported to the 1.4.2 release branch. We will then create a 1.4.3 release. We are requesting a CVE ID in order to coordinate updates with distributions that include binary packages for the Go programming language. We will also announce and request that all Go programs using the net/http package that were compiled with version 1.4.2 or earlier be recompiled with 1.4.3 or 1.5 (when released) due to the static linking nature of the Go toolchain. Please let me know if you need additional information. Regards, Jason Buberel Product Manager, Go Google, Inc.
Upstream has released fixed release.
(In reply to Mikle Kolyada from comment #1) > Upstream has released fixed release. nvmd, i was wrong
ll, go-1.5 is now in the tree; let me know what I need to do. Thanks, William
(In reply to William Hubbs from comment #3) > ll, > > go-1.5 is now in the tree; let me know what I need to do. > > Thanks, > > William it seems to be fixed in 1.5
shouldn't dev-lang/go and dev-lang/go-bootstrap be updated for this?
dev-lang/go is updated to 1.5.3 and dev-lang/go-bootstrap is 1.4.3.
All affected versions of dev-lang/go have been removed from the tree.
GLSA Vote: No