Skip to content
This repository was archived by the owner on Oct 13, 2023. It is now read-only.

[19.03 backport] Bump golang 1.12.8 (CVE-2019-9512, CVE-2019-9514)#322

Merged
andrewhsu merged 2 commits intodocker-archive:19.03from
thaJeztah:19.03_backport_bump_golang_1.12.8
Aug 14, 2019
Merged

[19.03 backport] Bump golang 1.12.8 (CVE-2019-9512, CVE-2019-9514)#322
andrewhsu merged 2 commits intodocker-archive:19.03from
thaJeztah:19.03_backport_bump_golang_1.12.8

Conversation

@thaJeztah
Copy link
Copy Markdown
Member

backport of moby#39738 for 19.03

go1.12.8 (released 2019/08/13) includes security fixes to the net/http and net/url packages.
See the Go 1.12.8 milestone on our issue tracker for details:

https://github.com/golang/go/issues?q=milestone%3AGo1.12.8

  • net/http: Denial of Service vulnerabilities in the HTTP/2 implementation
    net/http and golang.org/x/net/http2 servers that accept direct connections from untrusted
    clients could be remotely made to allocate an unlimited amount of memory, until the program
    crashes. Servers will now close connections if the send queue accumulates too many control
    messages.
    The issues are CVE-2019-9512 and CVE-2019-9514, and Go issue golang.org/issue/33606.
    Thanks to Jonathan Looney from Netflix for discovering and reporting these issues.
    This is also fixed in version v0.0.0-20190813141303-74dc4d7220e7 of golang.org/x/net/http2.
    net/url: parsing validation issue
  • url.Parse would accept URLs with malformed hosts, such that the Host field could have arbitrary
    suffixes that would appear in neither Hostname() nor Port(), allowing authorization bypasses
    in certain applications. Note that URLs with invalid, not numeric ports will now return an error
    from url.Parse.
    The issue is CVE-2019-14809 and Go issue golang.org/issue/29098.
    Thanks to Julian Hector and Nikolai Krein from Cure53, and Adi Cohen (adico.me) for discovering
    and reporting this issue.

Signed-off-by: Sebastiaan van Stijn github@gone.nl
(cherry picked from commit 73b0e4c)
Signed-off-by: Sebastiaan van Stijn github@gone.nl

- What I did

- How I did it

- How to verify it

- Description for the changelog

- A picture of a cute animal (not mandatory but encouraged)

go1.12.8 (released 2019/08/13) includes security fixes to the net/http and net/url packages.
See the Go 1.12.8 milestone on our issue tracker for details:

https://github.com/golang/go/issues?q=milestone%3AGo1.12.8

- net/http: Denial of Service vulnerabilities in the HTTP/2 implementation
  net/http and golang.org/x/net/http2 servers that accept direct connections from untrusted
  clients could be remotely made to allocate an unlimited amount of memory, until the program
  crashes. Servers will now close connections if the send queue accumulates too many control
  messages.
  The issues are CVE-2019-9512 and CVE-2019-9514, and Go issue golang.org/issue/33606.
  Thanks to Jonathan Looney from Netflix for discovering and reporting these issues.
  This is also fixed in version v0.0.0-20190813141303-74dc4d7220e7 of golang.org/x/net/http2.
  net/url: parsing validation issue
- url.Parse would accept URLs with malformed hosts, such that the Host field could have arbitrary
  suffixes that would appear in neither Hostname() nor Port(), allowing authorization bypasses
  in certain applications. Note that URLs with invalid, not numeric ports will now return an error
  from url.Parse.
  The issue is CVE-2019-14809 and Go issue golang.org/issue/29098.
  Thanks to Julian Hector and Nikolai Krein from Cure53, and Adi Cohen (adico.me) for discovering
  and reporting this issue.

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
(cherry picked from commit 73b0e4c)
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
@thaJeztah thaJeztah added this to the 19.03.2 milestone Aug 14, 2019
@thaJeztah thaJeztah changed the title [19.03 backport] Bump golang 1.12.8 (CVE-2019-9512, CVE-2019-9514) [WIP][19.03 backport] Bump golang 1.12.8 (CVE-2019-9512, CVE-2019-9514) Aug 14, 2019
```
00:38:11 === Failed
00:38:11 === FAIL: opts TestParseDockerDaemonHost (0.00s)
00:38:11     hosts_test.go:87: tcp tcp:a.b.c.d address expected error "Invalid bind address format: tcp:a.b.c.d" return, got "parse tcp://tcp:a.b.c.d: invalid port \":a.b.c.d\" after host" and addr
00:38:11     hosts_test.go:87: tcp tcp:a.b.c.d/path address expected error "Invalid bind address format: tcp:a.b.c.d/path" return, got "parse tcp://tcp:a.b.c.d/path: invalid port \":a.b.c.d\" after host" and addr
00:38:11
00:38:11 === FAIL: opts TestParseTCP (0.00s)
00:38:11     hosts_test.go:129: tcp tcp:a.b.c.d address expected error Invalid bind address format: tcp:a.b.c.d return, got parse tcp://tcp:a.b.c.d: invalid port ":a.b.c.d" after host and addr
00:38:11     hosts_test.go:129: tcp tcp:a.b.c.d/path address expected error Invalid bind address format: tcp:a.b.c.d/path return, got parse tcp://tcp:a.b.c.d/path: invalid port ":a.b.c.d" after host and addr
```

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
(cherry picked from commit 6837666)
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
@thaJeztah thaJeztah changed the title [WIP][19.03 backport] Bump golang 1.12.8 (CVE-2019-9512, CVE-2019-9514) [19.03 backport] Bump golang 1.12.8 (CVE-2019-9512, CVE-2019-9514) Aug 14, 2019
Copy link
Copy Markdown

@andrewhsu andrewhsu left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@andrewhsu andrewhsu merged commit 4bed012 into docker-archive:19.03 Aug 14, 2019
@thaJeztah thaJeztah deleted the 19.03_backport_bump_golang_1.12.8 branch August 14, 2019 18:56
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants