[tor-bugs] #31455 [Circumvention/meek]: Redeploy meek-server instances using Go 1.11.13+ / 1.12.8+
Tor Bug Tracker & Wiki
blackhole at torproject.org
Fri Nov 15 18:23:04 UTC 2019
#31455: Redeploy meek-server instances using Go 1.11.13+ / 1.12.8+
--------------------------------+------------------------
Reporter: dcf | Owner: sina
Type: defect | Status: closed
Priority: High | Milestone:
Component: Circumvention/meek | Version:
Severity: Normal | Resolution: fixed
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------+------------------------
Changes (by phw):
* status: assigned => closed
* resolution: => fixed
Old description:
> These versions fix a denial-of-service vulnerability in the HTTP/2 server
> code.
>
> https://groups.google.com/d/msg/golang-announce/65QixT3tcmg/DrFiG6vvCwAJ
> > We have just released Go 1.12.8 and Go 1.11.13 to address recently
> reported security issues. We recommend that all users update to one of
> these releases (if you’re not sure which, choose Go 1.12.8).
> > * net/http: Denial of Service vulnerabilities in the HTTP/2
> implementation
> >
> > net/http and golang.org/x/net/http2 servers that accept direct
> connections from untrusted clients could be remotely made to allocate an
> unlimited amount of memory, until the program crashes. Servers will now
> close connections if the send queue accumulates too many control
> messages.
> >
> > The issues are CVE-2019-9512 and CVE-2019-9514, and Go issue
> [https://golang.org/issue/33606 golang.org/issue/33606].
> >
> > This is also fixed in version v0.0.0-20190813141303-74dc4d7220e7 of
> golang.org/x/net/http2.
> >
> > * net/url: parsing validation issue
> >
> > url.Parse would accept URLs with malformed hosts, such that the Host
> field could have arbitrary suffixes that would appear in neither
> Hostname() nor Port(), allowing authorization bypasses in certain
> applications. Note that URLs with invalid, not numeric ports will now
> return an error from url.Parse.
> >
> > The issue is CVE-2019-14809 and Go issue
> [https://golang.org/issue/29098 golang.org/issue/29098].
>
> We need to redeploy the following servers:
> * cymrubridge02 (backend for meek-azure, run by inf0)
> * ~~BridgeDB Moat (run by sysrqb, phw)~~
> * ~~starman (throttled meek.bamsoftware.com, run by dcf)~~
> * ~~maenad (unthrottled meek.bamsoftware.com, run by dcf)~~
> * ~~GAEuploader (gaeuploader.meek.bamsoftware.com, run by dcf)~~
New description:
These versions fix a denial-of-service vulnerability in the HTTP/2 server
code.
https://groups.google.com/d/msg/golang-announce/65QixT3tcmg/DrFiG6vvCwAJ
> We have just released Go 1.12.8 and Go 1.11.13 to address recently
reported security issues. We recommend that all users update to one of
these releases (if you’re not sure which, choose Go 1.12.8).
> * net/http: Denial of Service vulnerabilities in the HTTP/2
implementation
>
> net/http and golang.org/x/net/http2 servers that accept direct
connections from untrusted clients could be remotely made to allocate an
unlimited amount of memory, until the program crashes. Servers will now
close connections if the send queue accumulates too many control messages.
>
> The issues are CVE-2019-9512 and CVE-2019-9514, and Go issue
[https://golang.org/issue/33606 golang.org/issue/33606].
>
> This is also fixed in version v0.0.0-20190813141303-74dc4d7220e7 of
golang.org/x/net/http2.
>
> * net/url: parsing validation issue
>
> url.Parse would accept URLs with malformed hosts, such that the Host
field could have arbitrary suffixes that would appear in neither
Hostname() nor Port(), allowing authorization bypasses in certain
applications. Note that URLs with invalid, not numeric ports will now
return an error from url.Parse.
>
> The issue is CVE-2019-14809 and Go issue
[https://golang.org/issue/29098 golang.org/issue/29098].
We need to redeploy the following servers:
* ~~cymrubridge02 (backend for meek-azure, run by inf0)~~
* ~~BridgeDB Moat (run by sysrqb, phw)~~
* ~~starman (throttled meek.bamsoftware.com, run by dcf)~~
* ~~maenad (unthrottled meek.bamsoftware.com, run by dcf)~~
* ~~GAEuploader (gaeuploader.meek.bamsoftware.com, run by dcf)~~
--
Comment:
[https://trac.torproject.org/projects/tor/ticket/31890#comment:5 Sina
updated to go1.13.4] so we're all good.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/31455#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list