|
Message-ID: <85f84da1-b77c-4d99-a529-6876c7beefd8@oracle.com> Date: Fri, 17 Jan 2025 11:48:14 -0800 From: Alan Coopersmith <alan.coopersmith@...cle.com> To: oss-security@...ts.openwall.com Subject: Go 1.23.5 and Go 1.22.11 are released with 2 security fixes https://groups.google.com/g/golang-announce/c/sSaUhLA-2SI announces: > We have just released Go versions 1.23.5 and 1.22.11, minor point releases. > > These minor releases include 2 security fixes following the security policy: > > crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints > > A certificate with a URI which has a IPv6 address with a zone ID may > incorrectly satisfy a URI name constraint that applies to the certificate > chain. > > Certificates containing URIs are not permitted in the web PKI, so this > only affects users of private PKIs which make use of URIs. > > Thanks to Juho Forsén of Mattermost for reporting this issue. > > This is CVE-2024-45341 and Go issue https://go.dev/issue/71156. > > net/http: sensitive headers incorrectly sent after cross-domain redirect > > The HTTP client drops sensitive headers after following a cross-domain redirect. > For example, a request to a.com/ containing an Authorization header which is > redirected to b.com/ will not send that header to b.com. > > In the event that the client received a subsequent same-domain redirect, however, > the sensitive headers would be restored. For example, a chain of redirects from > a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization > header to b.com/2. > > Thanks to Kyle Seely for reporting this issue. > > This is CVE-2024-45336 and Go issue https://go.dev/issue/70530. > > View the release notes for more information: > https://go.dev/doc/devel/release#go1.23.5 > > You can download binary and source distributions from the Go website: > https://go.dev/dl/ > > To compile from source using a Git clone, update to the release with > git checkout go1.23.5 and build as usual. > > Thanks to everyone who contributed to the releases. > > Cheers, > Michael and Dmitri for the Go team -- -Alan Coopersmith- alan.coopersmith@...cle.com Oracle Solaris Engineering - https://blogs.oracle.com/solaris
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.