Why are the other changes to be released but not related to this security 
issue not in rc2?

On Monday, July 18, 2016 at 9:59:54 AM UTC-7, Chris Broadfoot wrote:
>
> A security-related issue was recently reported in Go's net/http/cgi 
> package and net/http package when used in a CGI environment. Go 1.6.3 and 
> Go 1.7rc2 will contain a fix for this issue.
>
> Go versions 1.0-1.6.2 and 1.7rc1 are vulnerable to an input validation 
> flaw in the CGI components resulting in the HTTP_PROXY environment variable 
> being set by the incoming Proxy header. This environment variable was also 
> used to set the outgoing proxy, enabling an attacker to insert a proxy into 
> outgoing requests of a CGI program.
> This is CVE-2016-5386 and was addressed by this change: 
> https://golang.org/cl/25010, tracked in this issue: 
> https://golang.org/issue/16405
>
> The Go team would like to thank Dominic Scheirlinck for coordinating 
> disclosure of this issue across multiple languages and CGI environments. 
> Read more about "httpoxy" here: https://httpoxy.org/
>
> Go 1.6.3 also adds support for macOS Sierra. See 
> https://golang.org/issue/16354 for details.
>
> Downloads are available at https://golang.org/dl for all supported 
> platforms.
>
> Cheers,
> Chris (on behalf of the Go team)
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to golang-nuts+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to