Hello gophers,

We have just released Go versions 1.16.6 and 1.15.14, minor point releases.

These minor releases include a security fix according to the new security
policy (#44918 <https://golang.org/issue/44918>).

crypto/tls clients can panic when provided a certificate of the wrong type
for the negotiated parameters.
net/http clients performing HTTPS requests are also affected. The panic can
be triggered by an attacker
in a privileged network position without access to the server certificate's
private key, as long as a trusted
ECDSA or Ed25519 certificate for the server exists (or can be issued), or
the client is configured with
Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites
(that is, TLS 1.0–1.2 cipher
suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.


This is issue #47143 <https://golang.org/issue/47143> and CVE-2021-34558.
Thanks to Imre Rad for reporting this issue.


View the release notes for more information:
    https://golang.org/doc/devel/release.html#go1.16.minor

You can download binary and source distributions from the Go web site:
    https://golang.org/dl/

To compile from source using a Git clone, update to the release with
"git checkout go1.16.6" and build as usual.

Thanks to everyone who contributed to the releases.

Cheers,
Dmitri, Filippo, and Alex for the Go team

-- 
You received this message because you are subscribed to the Google Groups 
"golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to golang-nuts+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/golang-nuts/CA%2BON-PEUzhZ_F6yWyoBt%2BBc_sVgZ3JqHOGTN%2B4Qv5y1DNKC6JQ%40mail.gmail.com.

Reply via email to