[tor-bugs] #31455 [Circumvention/meek]: Redeploy meek-server instances using Go 1.11.13+ / 1.12.8+
Tor Bug Tracker & Wiki
blackhole at torproject.org
Mon Aug 19 19:00:35 UTC 2019
#31455: Redeploy meek-server instances using Go 1.11.13+ / 1.12.8+
------------------------------------+----------------------
Reporter: dcf | Owner: dcf
Type: defect | Status: assigned
Priority: High | Milestone:
Component: Circumvention/meek | Version:
Severity: Normal | Keywords:
Actual Points: | Parent ID:
Points: | Reviewer:
Sponsor: |
------------------------------------+----------------------
These versions fix a denial-of-service vulnerability in the HTTP/2 server
code.
https://groups.google.com/d/msg/golang-announce/65QixT3tcmg/DrFiG6vvCwAJ
> We have just released Go 1.12.8 and Go 1.11.13 to address recently
reported security issues. We recommend that all users update to one of
these releases (if you’re not sure which, choose Go 1.12.8).
> * net/http: Denial of Service vulnerabilities in the HTTP/2
implementation
>
> net/http and golang.org/x/net/http2 servers that accept direct
connections from untrusted clients could be remotely made to allocate an
unlimited amount of memory, until the program crashes. Servers will now
close connections if the send queue accumulates too many control messages.
>
> The issues are CVE-2019-9512 and CVE-2019-9514, and Go issue
[https://golang.org/issue/33606 golang.org/issue/33606].
>
> This is also fixed in version v0.0.0-20190813141303-74dc4d7220e7 of
golang.org/x/net/http2.
>
> * net/url: parsing validation issue
>
> url.Parse would accept URLs with malformed hosts, such that the Host
field could have arbitrary suffixes that would appear in neither
Hostname() nor Port(), allowing authorization bypasses in certain
applications. Note that URLs with invalid, not numeric ports will now
return an error from url.Parse.
>
> The issue is CVE-2019-14809 and Go issue
[https://golang.org/issue/29098 golang.org/issue/29098].
We need to redeploy the following servers:
* cymrubridge02 (backend for meek-azure, run by inf0)
* BridgeDB Moat (run by sysrqb, phw)
* starman (throttled meek.bamsoftware.com, run by dcf)
* maenad (unthrottled meek.bamsoftware.com, run by dcf)
* GAEuploader (gaeuploader.meek.bamsoftware.com, run by dcf)
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/31455>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list