Accepting request 980419 from devel:languages:go
- go1.17.11 (released 2022-06-01) includes security fixes to the crypto/rand, crypto/tls, os/exec, and path/filepath packages, as well as bug fixes to the crypto/tls package. Refs boo#1190649 go1.17 release tracking CVE-2022-30634 CVE-2022-30629 CVE-2022-30580 CVE-2022-29804 * boo#1200134 go#52561 CVE-2022-30634 * go#52932 crypto/rand: Read hangs when passed buffer larger than 1<<32 - 1 * boo#1200135 go#52814 CVE-2022-30629 * go#52832 crypto/tls: randomly generate ticket_age_add * boo#1200136 go#52574 CVE-2022-30580 * go#53056 os/exec: Cmd.{Run,Start} should fail if Cmd.Path is unset * boo#1200137 go#52476 CVE-2022-29804 * go#52478 path/filepath: Clean(.\c:) returns c: on Windows * go#52790 crypto/tls: 500% increase in allocations from (*tls.Conn).Read in go 1.17 * go#52826 runtime: TestGcSys is still flaky * go#53042 misc/cgo/testsanitizers: occasional hangs in TestTSAN/tsan12 * go#53049 runtime: TestGdbBacktrace failures due to GDB "internal-error: wait returned unexpected status 0x0" * go#53114 misc/cgo/testsanitizers: deadlock in TestTSAN/tsan11 (forwarded request 980417 from jfkw) OBS-URL: https://build.opensuse.org/request/show/980419 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/go1.17?expand=0&rev=16
This commit is contained in:
commit
adba4156a0
@ -1,3 +0,0 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:299e55af30f15691b015d8dcf8ecae72412412569e5b2ece20361753a456f2f9
|
||||
size 22196380
|
3
go1.17.11.src.tar.gz
Normal file
3
go1.17.11.src.tar.gz
Normal file
@ -0,0 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:ac2649a65944c6a5abe55054000eee3d77196880da36a3555f62e06540e8eb54
|
||||
size 22197784
|
@ -1,3 +1,25 @@
|
||||
-------------------------------------------------------------------
|
||||
Wed Jun 1 17:51:26 UTC 2022 - Jeff Kowalczyk <jkowalczyk@suse.com>
|
||||
|
||||
- go1.17.11 (released 2022-06-01) includes security fixes to the
|
||||
crypto/rand, crypto/tls, os/exec, and path/filepath packages, as
|
||||
well as bug fixes to the crypto/tls package.
|
||||
Refs boo#1190649 go1.17 release tracking
|
||||
CVE-2022-30634 CVE-2022-30629 CVE-2022-30580 CVE-2022-29804
|
||||
* boo#1200134 go#52561 CVE-2022-30634
|
||||
* go#52932 crypto/rand: Read hangs when passed buffer larger than 1<<32 - 1
|
||||
* boo#1200135 go#52814 CVE-2022-30629
|
||||
* go#52832 crypto/tls: randomly generate ticket_age_add
|
||||
* boo#1200136 go#52574 CVE-2022-30580
|
||||
* go#53056 os/exec: Cmd.{Run,Start} should fail if Cmd.Path is unset
|
||||
* boo#1200137 go#52476 CVE-2022-29804
|
||||
* go#52478 path/filepath: Clean(.\c:) returns c: on Windows
|
||||
* go#52790 crypto/tls: 500% increase in allocations from (*tls.Conn).Read in go 1.17
|
||||
* go#52826 runtime: TestGcSys is still flaky
|
||||
* go#53042 misc/cgo/testsanitizers: occasional hangs in TestTSAN/tsan12
|
||||
* go#53049 runtime: TestGdbBacktrace failures due to GDB "internal-error: wait returned unexpected status 0x0"
|
||||
* go#53114 misc/cgo/testsanitizers: deadlock in TestTSAN/tsan11
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue May 10 22:25:54 UTC 2022 - Jeff Kowalczyk <jkowalczyk@suse.com>
|
||||
|
||||
|
@ -145,7 +145,7 @@
|
||||
%endif
|
||||
|
||||
Name: go1.17
|
||||
Version: 1.17.10
|
||||
Version: 1.17.11
|
||||
Release: 0
|
||||
Summary: A compiled, garbage-collected, concurrent programming language
|
||||
License: BSD-3-Clause
|
||||
|
Loading…
Reference in New Issue
Block a user