Commit Graph

  • f14ede0ce5 Accepting request 1332055 from devel:languages:go factory Ana Guerrero 2026-02-10 20:11:53 +00:00
  • f5c934283e updated to 1.24.13 slfo-main slfo-1.2 Marcus Meissner 2026-02-10 13:18:15 +00:00
  • 3bdd87b0c6 Accepting request 1332051 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2026-02-09 14:24:53 +00:00
  • 60bdb66c8c Accepting request 1327528 from devel:languages:go Ana Guerrero 2026-01-18 21:18:26 +00:00
  • 8cf1bc186f Accepting request 1327528 from devel:languages:go Ana Guerrero 2026-01-18 21:18:26 +00:00
  • 7178c4b3f2 Accepting request 1327526 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2026-01-16 06:38:38 +00:00
  • 1832c90288 - go1.24.12 (released 2026-01-15) includes security fixes to the go command, and the archive/zip, crypto/tls, and net/url packages, as well as bug fixes to the compiler, the runtime, and the crypto/tls and os packages. Refs boo#1236217 go1.24 release tracking CVE-2025-61726 CVE-2025-61728 CVE-2025-61730 CVE-2025-61731 CVE-2025-68119 CVE-2025-68121 * go#76854 go#76443 boo#1256821 security: fix CVE-2025-61730 crypto/tls: handshake messages may be processed at the incorrect encryption level * go#77103 go#77099 boo#1256820 security: fix CVE-2025-68119 cmd/go: unexpected code execution when invoking toolchain * go#77105 go#77100 boo#1256819 security: fix CVE-2025-61731 cmd/go: bypass of flag sanitization can lead to arbitrary code execution * go#77107 go#77101 boo#1256817 security: fix CVE-2025-61726 net/http: memory exhaustion in Request.ParseForm * go#77109 go#77102 boo#1256816 security: fix CVE-2025-61728 archive/zip: denial of service when parsing arbitrary ZIP archives * go#77114 go#77113 boo#1256818 security: fix CVE-2025-68121 crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386 * go#76796 runtime: race detector crash on ppc64le * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling <function>: runtime error: index out of range Jeff Kowalczyk 2026-01-16 06:38:38 +00:00
  • 98a2c075e3 Accepting request 1327504 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2026-01-16 06:09:29 +00:00
  • eae3838b5d - go1.24.12 (released 2026-01-15) includes security fixes to the go command, and the archive/zip, crypto/tls, and net/url packages, as well as bug fixes to the compiler, the runtime, and the crypto/tls and os packages. Refs boo#1236217 go1.24 release tracking CVE-2025-61726 CVE-2025-61728 CVE-2025-61730 CVE-2025-61731 CVE-2025-68119 CVE-2025-68121 * go#76854 go#76443 boo#1256821 security: fix CVE-2025-61730 crypto/tls: handshake messages may be processed at the incorrect encryption level * go#77103 go#77099 boo#1256820 security: fix CVE-2025-68119 cmd/go: unexpected code execution when invoking toolchain * go#77105 go#77100 boo#1256819 security: fix CVE-2025-61731 cmd/go: bypass of flag sanitization can lead to arbitrary code execution * go#77107 go#77101 boo#1256817 security: fix CVE-2025-61726 net/http: memory exhaustion in Request.ParseForm * go#77109 go#77102 boo#1256816 security: fix CVE-2025-61728 archive/zip: denial of service when parsing arbitrary ZIP archives * go#77114 go#77113 boo#1256818 security: fix CVE-2025-68121 crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386 * go#76796 runtime: race detector crash on ppc64le * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling <function>: runtime error: index out of range Jeff Kowalczyk 2026-01-16 06:09:29 +00:00
  • c87861629c Accepting request 1320911 from devel:languages:go Ana Guerrero 2025-12-04 10:21:42 +00:00
  • 526f6dd067 Accepting request 1320911 from devel:languages:go Ana Guerrero 2025-12-04 10:21:42 +00:00
  • 0087bfd2f2 Accepting request 1320909 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-12-02 22:35:06 +00:00
  • 8b8a84eb3e - go1.24.11 (released 2025-12-02) includes two security fixes to the crypto/x509 package, as well as bug fixes to the runtime. Refs boo#1236217 go1.24 release tracking CVE-2025-61727 CVE-2025-61729 * go#76460 go#76445 boo#1254431 security: fix CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation * go#76463 go#76442 boo#1254430 security: fix CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN * go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364 cores Jeff Kowalczyk 2025-12-02 22:35:06 +00:00
  • e5fa002e1b Accepting request 1320873 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-12-02 16:00:59 +00:00
  • a56c98800a - Packaging: Migrate from update-alternatives to libalternatives Refs boo#1245878 * This is an optional migration controlled via prjconf definition with_libalternatives * If with_libalternatives is not defined packaging continues to use update-alternatives Jeff Kowalczyk 2025-12-02 16:00:59 +00:00
  • bf77164c6a Accepting request 1316086 from devel:languages:go Ana Guerrero 2025-11-07 17:21:41 +00:00
  • 53fea89bbf Accepting request 1316086 from devel:languages:go Ana Guerrero 2025-11-07 17:21:41 +00:00
  • ac99d78d03 Accepting request 1316084 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-11-06 18:11:14 +00:00
  • d1f81cf747 - go1.24.10 (released 2025-11-05) includes fixes to the encoding/pem and net/url packages. Refs boo#1236217 go1.24 release tracking * go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets * go#75951 encoding/pem: regression when decoding blocks with leading garbage * go#76028 pem/encoding: malformed line endings can cause panics - Packaging improvements: * Remove net-url-allow-IP-literals-with-IPv4-mapped-IPv6-addresses.patch No longer needed with go#75831 in latest upstream release Jeff Kowalczyk 2025-11-06 18:11:14 +00:00
  • 4ad2d09a0f Accepting request 1316074 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-11-06 17:53:52 +00:00
  • 725d06a641 - go1.24.10 (released 2025-11-05) includes fixes to the encoding/pem and net/url packages. * go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets * go#75951 encoding/pem: regression when decoding blocks with leading garbage * go#76028 pem/encoding: malformed line endings can cause panics - Packaging improvements: * Remove net-url-allow-IP-literals-with-IPv4-mapped-IPv6-addresses.patch No longer needed with go#75831 in latest upstream release Jeff Kowalczyk 2025-11-06 17:53:52 +00:00
  • a66501a68d Accepting request 1311562 from devel:languages:go Dominique Leuenberger 2025-10-18 12:34:57 +00:00
  • af711a7402 Accepting request 1311562 from devel:languages:go Dominique Leuenberger 2025-10-18 12:34:57 +00:00
  • 530602aafb Accepting request 1311560 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-10-15 23:19:18 +00:00
  • bdb4fec1ea - go1.24.9 (released 2025-10-13) includes fixes to the crypto/x509 package. Refs boo#1236217 go1.24 release tracking * go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot - Packaging improvements: * Add net-url-allow-IP-literals-with-IPv4-mapped-IPv6-addresses.patch needed today and will be available in the next upstream release Jeff Kowalczyk 2025-10-15 23:19:18 +00:00
  • f8f29e111b Accepting request 1311265 from devel:languages:go Dominique Leuenberger 2025-10-15 10:44:42 +00:00
  • 479f622dd0 Accepting request 1311265 from devel:languages:go Dominique Leuenberger 2025-10-15 10:44:42 +00:00
  • df59a0acb6 Accepting request 1311263 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-10-14 02:20:20 +00:00
  • 6dfb616cde - go1.24.9 (released 2025-10-13) includes fixes to the crypto/x509 package. Refs boo#1236217 go1.24 release tracking * go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot Jeff Kowalczyk 2025-10-14 02:20:20 +00:00
  • 31c60de62a Accepting request 1309725 from devel:languages:go Dominique Leuenberger 2025-10-08 16:12:50 +00:00
  • fded966a3c Accepting request 1309725 from devel:languages:go Dominique Leuenberger 2025-10-08 16:12:50 +00:00
  • cf997ce4c3 Accepting request 1309723 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-10-08 04:48:52 +00:00
  • 5615763b98 - go1.24.8 (released 2025-10-07) includes security fixes to the archive/tar, crypto/tls, crypto/x509, encoding/asn1, encoding/pem, net/http, net/mail, net/textproto, and net/url packages, as well as bug fixes to the compiler, the linker, and the debug/pe, net/http, os, and sync/atomic packages. Refs boo#1236217 go1.24 release tracking CVE-2025-58189 CVE-2025-61725 CVE-2025-58188 CVE-2025-58185 CVE-2025-58186 CVE-2025-61723 CVE-2025-58183 CVE-2025-47912 CVE-2025-58187 CVE-2025-61724 * go#75660 go#75652 boo#1251255 security: fix CVE-2025-58189 crypto/tls: ALPN negotiation error contains attacker controlled information * go#75700 go#75680 boo#1251253 security: fix CVE-2025-61725 net/mail: excessive CPU consumption in ParseAddress * go#75702 go#75675 boo#1251260 security: fix CVE-2025-58188 crypto/x509: panic when validating certificates with DSA public keys * go#75704 go#75671 boo#1251258 security: fix CVE-2025-58185 encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion * go#75706 go#75672 boo#1251259 security: fix CVE-2025-58186 net/http: lack of limit when parsing cookies can cause memory exhaustion * go#75708 go#75676 boo#1251256 security: fix CVE-2025-61723 encoding/pem: quadratic complexity when parsing some invalid inputs * go#75710 go#75677 boo#1251261 security: fix CVE-2025-58183 archive/tar: unbounded allocation when parsing GNU sparse map * go#75712 go#75678 boo#1251257 security: fix CVE-2025-47912 net/url: insufficient validation of bracketed IPv6 hostnames * go#75714 go#75681 boo#1251254 security: fix CVE-2025-58187 crypto/x509: quadratic complexity when checking name constraints * go#75717 go#75716 boo#1251262 security: fix CVE-2025-61724 net/textproto: excessive CPU consumption in Reader.ReadResponse * go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root * go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21 * go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol * go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9 * go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9 * go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail * go#75538 net/http: internal error: connCount underflow * go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn * go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value Jeff Kowalczyk 2025-10-08 04:48:52 +00:00
  • 183d9d114a Accepting request 1306079 from devel:languages:go Ana Guerrero 2025-09-22 14:38:24 +00:00
  • 03d575c325 Accepting request 1306079 from devel:languages:go Ana Guerrero 2025-09-22 14:38:24 +00:00
  • fea5ea1141 Accepting request 1306078 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-09-20 04:17:23 +00:00
  • bee461fb03 - Package svgpan.js to fix issues with "go tool pprof". boo#1249985 Jeff Kowalczyk 2025-09-20 04:17:23 +00:00
  • 63188ebaa9 Accepting request 1302805 from devel:languages:go Ana Guerrero 2025-09-08 07:56:35 +00:00
  • 284d3071d7 Accepting request 1302805 from devel:languages:go Ana Guerrero 2025-09-08 07:56:35 +00:00
  • f62a65a44b Accepting request 1302803 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-09-04 19:05:14 +00:00
  • aad9b950ba - go1.24.7 (released 2025-09-03) includes fixes to the go command, and the net and os/exec packages. Refs boo#1236217 go1.24 release tracking * go#75007 os/exec: TestLookPath fails on plan9 after CL 685755 * go#74821 cmd/go: "get toolchain@latest" should ignore release candidates * go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets Jeff Kowalczyk 2025-09-04 19:05:14 +00:00
  • 07aa9c510b Accepting request 1298039 from devel:languages:go Dominique Leuenberger 2025-08-08 13:09:16 +00:00
  • 0d40c46977 Accepting request 1298039 from devel:languages:go Dominique Leuenberger 2025-08-08 13:09:16 +00:00
  • 92fd72db9c Accepting request 1298036 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-08-07 04:48:58 +00:00
  • 3de5fee38d - go1.24.6 (released 2025-08-06) includes security fixes to the database/sql and os/exec packages, as well as bug fixes to the runtime. Refs boo#1236217 go1.24 release tracking CVE-2025-47906 CVE-2025-47907 * go#74804 go#74466 boo#1247719 security: fix CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of "", "." and ".." in some PATH configurations * go#74833 go#74831 boo#1247720 security: fix CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan * go#73800 runtime: RSS seems to have increased in Go 1.24 while the runtime accounting has not * go#74416 runtime: use-after-free of allpSnapshot in findRunnable * go#74694 runtime: segfaults in runtime.(*unwinder).next * go#74760 os/user:nolibgcc: TestGroupIdsTestUser failures Jeff Kowalczyk 2025-08-07 04:48:58 +00:00
  • be45e56d58 Accepting request 1291362 from devel:languages:go Ana Guerrero 2025-07-09 15:26:28 +00:00
  • 6b91690db2 Accepting request 1291362 from devel:languages:go Ana Guerrero 2025-07-09 15:26:28 +00:00
  • 785a10d454 Accepting request 1291359 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-07-08 19:58:50 +00:00
  • c0f2e61b1b Accepting request 1291359 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-07-08 19:58:50 +00:00
  • 10a183a500 Accepting request 1283453 from devel:languages:go Ana Guerrero 2025-06-10 06:57:57 +00:00
  • 7f1c468736 Accepting request 1283453 from devel:languages:go Ana Guerrero 2025-06-10 06:57:57 +00:00
  • 280da74e4a Accepting request 1283449 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-06-05 20:18:45 +00:00
  • 4fb9b1b0fc Accepting request 1283449 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-06-05 20:18:45 +00:00
  • 659c607be8 Accepting request 1275268 from devel:languages:go Dominique Leuenberger 2025-05-07 17:16:03 +00:00
  • d2f624f033 Accepting request 1275268 from devel:languages:go Dominique Leuenberger 2025-05-07 17:16:03 +00:00
  • b0d6891e0a Accepting request 1275267 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-05-07 12:20:03 +00:00
  • 6f56fe42f1 - go1.24.3 (released 2025-05-06) includes security fixes to the os package, as well as bug fixes to the runtime, the compiler, the linker, the go command, and the crypto/tls and os packages. Refs boo#1236217 go1.24 release tracking CVE-2025-22873 * go#73556 go#73555 boo#1242715 security: fix CVE-2025-22873 os: Root permits access to parent directory * go#73082 os: Root.Open panics when opening a symlink referencing the root * go#73092 cmd/link: linkname directive on userspace variable can override runtime variable * go#73118 crypto/tls: ECH decodeInnerClientHello incorrectly rejects ClientHello with GREASE values in supportedVersions * go#73144 runtime: segmentation fault from vgetrandomPutState and runtime.growslice w/ runtime.OSLockThread * go#73192 runtime: -race data race map traceback report incorrect functions * go#73281 cmd/compile: program compiles to wasm but is invalid: go:wasmexport: integer too large * go#73379 runtime, x/sys/unix: Connectx is broken on darwin/amd64 * go#73440 cmd/compile: infinite loop in the inliner * go#73500 cmd/go: +dirty in version stamping doesn't combine well with +incompatible - Packaging improvements: * Drop gh-issue-73141.patch to repair random segmentation faults (boo#1240764) fixed in upstream release. Jeff Kowalczyk 2025-05-07 12:20:03 +00:00
  • 0c3920411f Accepting request 1275044 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-05-07 03:48:19 +00:00
  • 09f2ad1e7a - go1.24.3 (released 2025-05-06) includes security fixes to the os package, as well as bug fixes to the runtime, the compiler, the linker, the go command, and the crypto/tls and os packages. Refs boo#1236217 go1.24 release tracking CVE-2025-22873 * go#73556 go#73555 boo#73555 security: fix CVE-2025-22873 os: Root permits access to parent directory * go#73082 os: Root.Open panics when opening a symlink referencing the root * go#73092 cmd/link: linkname directive on userspace variable can override runtime variable * go#73118 crypto/tls: ECH decodeInnerClientHello incorrectly rejects ClientHello with GREASE values in supportedVersions * go#73144 runtime: segmentation fault from vgetrandomPutState and runtime.growslice w/ runtime.OSLockThread * go#73192 runtime: -race data race map traceback report incorrect functions * go#73281 cmd/compile: program compiles to wasm but is invalid: go:wasmexport: integer too large * go#73379 runtime, x/sys/unix: Connectx is broken on darwin/amd64 * go#73440 cmd/compile: infinite loop in the inliner * go#73500 cmd/go: +dirty in version stamping doesn't combine well with +incompatible - Packaging improvements: * Drop gh-issue-73141.patch to repair random segmentation faults (boo#1240764) fixed in upstream release. Jeff Kowalczyk 2025-05-07 03:48:19 +00:00
  • d062b26d99 Accepting request 1272001 from devel:languages:go Ana Guerrero 2025-04-23 13:17:59 +00:00
  • 5b7317fc74 Accepting request 1272001 from devel:languages:go Ana Guerrero 2025-04-23 13:17:59 +00:00
  • e0998cb3e3 Accepting request 1271898 from home:crameleon:boo1240764 Jeff Kowalczyk 2025-04-22 17:51:41 +00:00
  • 6d36d10314 Add gh-issue-73141.patch to repair random segmentation faults (boo#1240764) Jeff Kowalczyk 2025-04-22 17:51:41 +00:00
  • b9582af621 Accepting request 1266903 from devel:languages:go Ana Guerrero 2025-04-03 16:43:15 +00:00
  • 0ede28fe6c Accepting request 1266903 from devel:languages:go Ana Guerrero 2025-04-03 16:43:15 +00:00
  • 773ada0f0a Accepting request 1266902 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-04-03 13:49:39 +00:00
  • 30c5d867ff - Packaging improvements: * SLE-12 only: Fix conditional for go-fixsecomp.patch to work correctly when suse_version is undefined. Refs boo#1239182 * Fix RPM warning by removing valid macro syntax in comment describing naming format of llvm-tsan_commit.tar.xz Jeff Kowalczyk 2025-04-03 13:49:39 +00:00
  • 5bb05ce002 Accepting request 1266346 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-04-02 02:35:31 +00:00
  • d9c092aa3c - go1.24.2 (released 2025-04-01) includes security fixes to the net/http package, as well as bug fixes to the compiler, the runtime, the go command, and the crypto/tls, go/types, net/http, and testing packages. Refs boo#1236217 go1.24 release tracking CVE-2025-22871 * go#72011 go#71988 boo#1240550 security: fix CVE-2025-22871 net/http: reject bare LF in chunked encoding * go#72067 cmd/compile: out of memory * go#72103 net/http: go1.24 breaks compatibility by modifying in-place the tls.Config{NextProtos} * go#72115 runtime: process hangs for mips hardware * go#72796 runtime: add an example for AddCleanup * go#72822 cmd/compile: OOM with mutually-recursive iter.Seq * go#72823 crypto/tls: FIPS 140-3 modes reject ECDSA w/ curve P-521/SHA-512 in TLS * go#72826 go/types, types2: CheckExpr / Eval may mutate type checked objects (=> data race) * go#72872 runtime: cgo callback on extra M treated as external code after nested cgo callback returns * go#72934 testing: b.StopTimer breaks b.Loop * go#72938 internal/godebugs: winsymlink and winreadlinkvolume have incorrect defaults for Go 1.22 * go#72974 testing: b.Loop gives bogus results in some situations - Packaging improvements: * SLE-12 only: Add declarations to Cgo seccomp_linux.go for new syscalls seccomp and getrandom which are not present in the kernel headers supplied by glibc version in SLE-12. (Marcus Meissner) Refs boo#1239182 * Add patch go-fixseccomp.patch Jeff Kowalczyk 2025-04-02 02:35:31 +00:00
  • 3c7cf6aead Accepting request 1266333 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-04-01 21:39:02 +00:00
  • 0b0b9b7fdb - go1.24.2 (released 2025-04-01) includes security fixes to the net/http package, as well as bug fixes to the compiler, the runtime, the go command, and the crypto/tls, go/types, net/http, and testing packages. Refs boo#1236217 go1.24 release tracking CVE-2025-22871 * go#72011 go#71988 boo#1240550 security: fix CVE-2025-22871 net/http: reject bare LF in chunked encoding * go#72067 cmd/compile: out of memory * go#72103 net/http: go1.24 breaks compatibility by modifying in-place the tls.Config{NextProtos} * go#72115 runtime: process hangs for mips hardware * go#72796 runtime: add an example for AddCleanup * go#72822 cmd/compile: OOM with mutually-recursive iter.Seq * go#72823 crypto/tls: FIPS 140-3 modes reject ECDSA w/ curve P-521/SHA-512 in TLS * go#72826 go/types, types2: CheckExpr / Eval may mutate type checked objects (=> data race) * go#72872 runtime: cgo callback on extra M treated as external code after nested cgo callback returns * go#72934 testing: b.StopTimer breaks b.Loop * go#72938 internal/godebugs: winsymlink and winreadlinkvolume have incorrect defaults for Go 1.22 * go#72974 testing: b.Loop gives bogus results in some situations Jeff Kowalczyk 2025-04-01 21:39:02 +00:00
  • 4c8bd4d2e8 Accepting request 1250292 from devel:languages:go Ana Guerrero 2025-03-06 13:48:19 +00:00
  • 5cea8661a1 Accepting request 1250292 from devel:languages:go Ana Guerrero 2025-03-06 13:48:19 +00:00
  • 73fb391090 Accepting request 1250289 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-03-05 03:44:58 +00:00
  • 05a008975c - go1.24.1 (released 2025-03-04) includes security fixes to the net/http, x/net/proxy, and x/net/http/httpproxy packages, as well as bug fixes to the compiler, the runtime, the go command and the crypto, debug, os and reflect packages. Refs boo#1236217 go1.24 release tracking CVE-2025-22870 * go#71986 go#71984 boo#1238572 security: fix CVE-2025-22870 net/http, x/net/proxy, x/net/http/httpproxy: proxy bypass using IPv6 zone IDs * go#71687 cmd/go: panics with GOAUTH='git dir' go get -x * go#71705 runtime: add linkname of runtime.lastmoduledatap for cloudwego/sonic * go#71728 runtime: usleep computes wrong tv_nsec on s390x * go#71745 crypto: add fips140 as an opaque GODEBUG setting and add documentation for it * go#71829 cmd/compile: fail to compile package in 1.24 * go#71836 os: possible regression from Go 1.23 to Go 1.24 when opening DevNull with O_TRUNC * go#71840 runtime: recover added in range-over-func loop body doesn't stop panic propagation / segfaults printing error * go#71849 os: spurious SIGCHILD on running child process * go#71855 cmd/compile: Pow10 freeze the compiler on certain condition on Go 1.24 * go#71858 debug/buildinfo: false positives with external scanners flag for go117 binary in testdata * go#71876 reflect: Value.Seq panicking on functional iterator methods * go#71904 cmd/compile: nil dereference when storing field of non-nil struct value * go#71916 reflect: Value.Seq iteration value types not matching the type of given int types * go#71938 cmd/compile: "fatal error: found pointer to free object" on arm64 * go#71955 proposal: runtime: allow cleanups to run concurrently * go#71963 runtime/cgo: does not build with -Wdeclaration-after-statement * go#71977 syscall: js/wasm file operations fail on windows / node.js Jeff Kowalczyk 2025-03-05 03:44:58 +00:00
  • a22e3cbe04 Accepting request 1250286 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-03-05 03:39:01 +00:00
  • 9a319c14c8 - go1.24.1 (released 2025-03-04) includes security fixes to the net/http, x/net/proxy, and x/net/http/httpproxy packages, as well as bug fixes to the compiler, the runtime, the go command and the crypto, debug, os and reflect packages. Refs boo#1236217 go1.24 release tracking CVE-2025-22870 * go#71986 go#71984 boo#1238572 security: fix CVE-2025-22870 net/http, x/net/proxy, x/net/http/httpproxy: proxy bypass using IPv6 zone IDs * go#71977 syscall: js/wasm file operations fail on windows / node.js * go#71963 runtime/cgo: does not build with -Wdeclaration-after-statement * go#71955 proposal: runtime: allow cleanups to run concurrently * go#71938 cmd/compile: "fatal error: found pointer to free object" on arm64 * go#71916 reflect: Value.Seq iteration value types not matching the type of given int types * go#71904 cmd/compile: nil dereference when storing field of non-nil struct value * go#71876 reflect: Value.Seq panicking on functional iterator methods * go#71858 debug/buildinfo: false positives with external scanners flag for go117 binary in testdata * go#71855 cmd/compile: Pow10 freeze the compiler on certain condition on Go 1.24 * go#71849 os: spurious SIGCHILD on running child process * go#71840 runtime: recover added in range-over-func loop body doesn't stop panic propagation / segfaults printing error * go#71836 os: possible regression from Go 1.23 to Go 1.24 when opening DevNull with O_TRUNC * go#71829 cmd/compile: fail to compile package in 1.24 * go#71745 crypto: add fips140 as an opaque GODEBUG setting and add documentation for it * go#71728 runtime: usleep computes wrong tv_nsec on s390x * go#71705 runtime: add linkname of runtime.lastmoduledatap for cloudwego/sonic * go#71687 cmd/go: panics with GOAUTH='git dir' go get -x Jeff Kowalczyk 2025-03-05 03:39:01 +00:00
  • 56ce77c715 Accepting request 1245176 from devel:languages:go Ana Guerrero 2025-02-12 20:31:31 +00:00
  • 2569d37970 Accepting request 1245176 from devel:languages:go Ana Guerrero 2025-02-12 20:31:31 +00:00
  • 6b1c4a27ba Accepting request 1245175 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-02-11 22:04:57 +00:00
  • 0907eed490 - go1.24 (released 2025-02-11) is a major release of Go. go1.24.x minor releases will be provided through February 2026. https://github.com/golang/go/wiki/Go-Release-Cycle go1.24 arrives six months after Go 1.23. Most of its changes are in the implementation of the toolchain, runtime, and libraries. As always, the release maintains the Go 1 promise of compatibility. We expect almost all Go programs to continue to compile and run as before. Refs boo#1236217 go1.24 release tracking Jeff Kowalczyk 2025-02-11 22:04:57 +00:00
  • 0d7525e730 Accepting request 1243516 from devel:languages:go Ana Guerrero 2025-02-06 21:07:49 +00:00
  • 92ce92ba6a Accepting request 1243516 from devel:languages:go Ana Guerrero 2025-02-06 21:07:49 +00:00
  • 6caa8cdde0 Accepting request 1243515 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-02-05 22:12:11 +00:00
  • b764809bf6 - go1.24rc3 (released 2024-02-05) is a release candidate version of go1.24 cut from the master branch at the revision tagged go1.24rc3. Refs boo#1236217 go1.24 release tracking CVE-2025-22866 CVE-2025-22867 * go#71423 go#71383 boo#1236801 security: fix CVE-2025-22866 crypto/internal/fips140/nistec: p256NegCond is variable time on ppc64le * go#71476 boo#1236839 security: fix CVE-2025-22867 cmd/go: arbitrary code execution during build on darwin Jeff Kowalczyk 2025-02-05 22:12:11 +00:00
  • ca670b3dca Accepting request 1240021 from devel:languages:go Dominique Leuenberger 2025-01-24 12:40:51 +00:00
  • 2674551b99 Accepting request 1240021 from devel:languages:go Dominique Leuenberger 2025-01-24 12:40:51 +00:00
  • 52e4669114 Accepting request 1240018 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2025-01-24 06:44:24 +00:00
  • 53a1923e37 - go1.24rc2 (released 2024-01-16) is a release candidate version of go1.24 cut from the master branch at the revision tagged go1.24rc2. Refs boo#1236217 go1.24 release tracking CVE-2024-45341 CVE-2024-45336 CVE-2025-22865 CVE-2024-45340 * go#71209 go#71156 boo#1236045 security: fix CVE-2024-45341 crypto/x509: properly check for IPv6 hosts in URIs * go#71212 go#70530 boo#1236046 security: fix CVE-2024-45336 net/http: persist header stripping across repeated redirects * go#71216 boo#1236361 security: fix CVE-2025-22865 crypto/x509: avoid panic when parsing partial PKCS#1 private keys * go#71249 boo#1236360 security: fix CVE-2024-45340 cmd/go: restore netrc preferences for GOAUTH and fix domain lookup Jeff Kowalczyk 2025-01-24 06:44:24 +00:00
  • 3688fc1a5b Accepting request 1231292 from devel:languages:go Ana Guerrero 2024-12-16 18:17:11 +00:00
  • 93b46b0ab7 Accepting request 1231292 from devel:languages:go Ana Guerrero 2024-12-16 18:17:11 +00:00
  • 379bd03cee Accepting request 1231174 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2024-12-15 00:07:34 +00:00
  • edddae3c62 Accepting request 1231174 from home:jfkw:branches:devel:languages:go Jeff Kowalczyk 2024-12-15 00:07:34 +00:00