ef4aa12229
Fixes the following security vulnerability: CVE-2019-9741: An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command. Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
4 lines
204 B
Plaintext
4 lines
204 B
Plaintext
# From https://golang.org/dl/
|
|
sha256 a96da1425dcbec094736033a8a416316547f8100ab4b72c31d4824d761d3e133 go1.11.6.src.tar.gz
|
|
sha256 2d36597f7117c38b006835ae7f537487207d8ec407aa9d9980794b2030cbc067 LICENSE
|