Hello OSS Security Community,
The Go open source project has received notification of an HTTP request
smuggling vulnerability in the net/http library (
http://golang.org/pkg/net/http/). The vulnerability was identified in the
1.4.2 release version (http://golang.org/dl) and in the 1.5 release branch.
Patches have already been applied to the 1.5 release branch, and will be
ported to the 1.4.2 release branch. We will then create a 1.4.3 release.
We are requesting a CVE ID in order to coordinate updates with
distributions that include binary packages for the Go programming language.
We will also announce and request that all Go programs using the net/http
package that were compiled with version 1.4.2 or earlier be recompiled with
1.4.3 or 1.5 (when released) due to the static linking nature of the Go
Please let me know if you need additional information.
Product Manager, Go
Upstream has released fixed release.
(In reply to Mikle Kolyada from comment #1)
> Upstream has released fixed release.
nvmd, i was wrong
go-1.5 is now in the tree; let me know what I need to do.
(In reply to William Hubbs from comment #3)
> go-1.5 is now in the tree; let me know what I need to do.
it seems to be fixed in 1.5
shouldn't dev-lang/go and dev-lang/go-bootstrap be updated for this?
dev-lang/go is updated to 1.5.3 and dev-lang/go-bootstrap is 1.4.3.
All affected versions of dev-lang/go have been removed from the tree.
GLSA Vote: No