-
-
Notifications
You must be signed in to change notification settings - Fork 15.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
go: 1.11.4 -> 1.11.5 #54658
go: 1.11.4 -> 1.11.5 #54658
Conversation
https://groups.google.com/forum/#!msg/golang-announce/mVeX35iXuSw/Flp8FX7QEAAJ We have just released Go 1.11.5 and Go 1.10.8 to address a recently reported security issue. We recommend that all users update to one of these releases (if you’re not sure which, choose Go 1.11.5). This DoS vulnerability in the crypto/elliptic implementations of the P-521 and P-384 elliptic curves may let an attacker craft inputs that consume excessive amounts of CPU. These inputs might be delivered via TLS handshakes, X.509 certificates, JWT tokens, ECDH shares or ECDSA signatures. In some cases, if an ECDH private key is reused more than once, the attack can also lead to key recovery. The issue is CVE-2019-6486 and Go issue golang.org/issue/29903. See the Go issue for more details.
It's not a big rebuild, so it seems suitable for direct merge to master. Let's check darwin as well: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Seems good, but I'm not a go
person.
Upstream only supports two latest releases. golang/go#29903 (comment)
@GrahamcOfBorg build go_1_10 |
We can merge this as it is. I am just wonder where the eval error is coming from. |
@GrahamcOfBorg eval |
That was eval error for master: eb965a4. |
https://groups.google.com/forum/#!topic/golang-announce/mVeX35iXuSw #54658 (cherry picked from commit d32e779)
I updated nixos (nixos-version shows 18.09.2096.2ff7ef373e5), and noticed that The reason for this is that
By the name, The thing is, I do have go 1.11.5. For example, Is there something wrong in my patch, or is there something more that needs to be done on the client end? |
I'd inspect your
|
Yeah, it was a result of a conflict with nix-env. I removed everything from nix-env and everything works now. Thanks. |
https://groups.google.com/forum/#!msg/golang-announce/mVeX35iXuSw/Flp8FX7QEAAJ
We have just released Go 1.11.5 and Go 1.10.8 to address a recently reported security issue. We recommend that all users update to one of these releases (if you’re not sure which, choose Go 1.11.5).
This DoS vulnerability in the crypto/elliptic implementations of the P-521 and P-384 elliptic curves may let an attacker craft inputs that consume excessive amounts of CPU.
These inputs might be delivered via TLS handshakes, X.509 certificates, JWT tokens, ECDH shares or ECDSA signatures. In some cases, if an ECDH private key is reused more than once, the attack can also lead to key recovery.
The issue is CVE-2019-6486 and Go issue golang.org/issue/29903. See the Go issue for more details.
Motivation for this change
Things done
sandbox
innix.conf
on non-NixOS)nix-shell -p nox --run "nox-review wip"
./result/bin/
)nix path-info -S
before and after)