golang-1.15: CVE-2021-36221

Related Vulnerabilities: CVE-2021-36221  

Debian Bug report logs - #991961
golang-1.15: CVE-2021-36221

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Fri, 6 Aug 2021 17:51:04 UTC

Severity: important

Tags: security, upstream

Found in version golang-1.15/1.15.9-6

Forwarded to https://github.com/golang/go/issues/46866

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, Go Compiler Team <team+go-compiler@tracker.debian.org>:
Bug#991961; Package src:golang-1.15. (Fri, 06 Aug 2021 17:51:06 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, Go Compiler Team <team+go-compiler@tracker.debian.org>. (Fri, 06 Aug 2021 17:51:06 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: golang-1.15: CVE-2021-36221
Date: Fri, 06 Aug 2021 19:49:33 +0200
Source: golang-1.15
Version: 1.15.9-6
Severity: important
Tags: security upstream
Forwarded: https://github.com/golang/go/issues/46866
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>

Hi,

The following vulnerability was published for golang-1.15.

CVE-2021-36221[0]:
| net/http: panic due to racy read of persistConn after handler panic

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-36221
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36221
[1] https://github.com/golang/go/issues/46866

Regards,
Salvatore



Information forwarded to debian-bugs-dist@lists.debian.org, Go Compiler Team <team+go-compiler@tracker.debian.org>:
Bug#991961; Package src:golang-1.15. (Fri, 06 Aug 2021 20:06:02 GMT) (full text, mbox, link).


Acknowledgement sent to Shengjing Zhu <zhsj@debian.org>:
Extra info received and forwarded to list. Copy sent to Go Compiler Team <team+go-compiler@tracker.debian.org>. (Fri, 06 Aug 2021 20:06:02 GMT) (full text, mbox, link).


Message #10 received at 991961@bugs.debian.org (full text, mbox, reply):

From: Shengjing Zhu <zhsj@debian.org>
To: Salvatore Bonaccorso <carnil@debian.org>, 991961@bugs.debian.org
Cc: Debian release team <debian-release@lists.debian.org>
Subject: Re: Bug#991961: golang-1.15: CVE-2021-36221
Date: Sat, 7 Aug 2021 04:01:49 +0800
Hi,

On Sat, Aug 7, 2021 at 1:51 AM Salvatore Bonaccorso <carnil@debian.org> wrote:
>
> Source: golang-1.15
> Version: 1.15.9-6
> Severity: important
> Tags: security upstream
> Forwarded: https://github.com/golang/go/issues/46866
> X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
>
> Hi,
>
> The following vulnerability was published for golang-1.15.
>
> CVE-2021-36221[0]:
> | net/http: panic due to racy read of persistConn after handler panic
>

The issue looks minor(upstream disclose it without pre-announce).
Should we fix it before the bullseye release?
Fixing issues in the compiler's std library needs to rebuild the whole
world, see #990825

Or we just postpone later, or just fix the compiler package along?

-- 
Shengjing Zhu



Information forwarded to debian-bugs-dist@lists.debian.org, Go Compiler Team <team+go-compiler@tracker.debian.org>:
Bug#991961; Package src:golang-1.15. (Fri, 06 Aug 2021 20:30:03 GMT) (full text, mbox, link).


Acknowledgement sent to Paul Gevers <elbrus@debian.org>:
Extra info received and forwarded to list. Copy sent to Go Compiler Team <team+go-compiler@tracker.debian.org>. (Fri, 06 Aug 2021 20:30:03 GMT) (full text, mbox, link).


Message #15 received at 991961@bugs.debian.org (full text, mbox, reply):

From: Paul Gevers <elbrus@debian.org>
To: Shengjing Zhu <zhsj@debian.org>, Salvatore Bonaccorso <carnil@debian.org>, 991961@bugs.debian.org
Cc: Debian release team <debian-release@lists.debian.org>
Subject: Re: Bug#991961: golang-1.15: CVE-2021-36221
Date: Fri, 6 Aug 2021 22:28:27 +0200
[Message part 1 (text/plain, inline)]
Hi Shengjing,

On 06-08-2021 22:01, Shengjing Zhu wrote:
> Should we fix it before the bullseye release?

No, at least not in 11.0.

Paul

[OpenPGP_signature (application/pgp-signature, attachment)]

Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Sat Aug 7 16:17:47 2021; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.