3bdd87b0c6
Accepting request 1332051 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2026-02-09 14:24:53 +00:00
60bdb66c8c
Accepting request 1327528 from devel:languages:go
Ana Guerrero2026-01-18 21:18:26 +00:00
8cf1bc186f
Accepting request 1327528 from devel:languages:go
Ana Guerrero2026-01-18 21:18:26 +00:00
7178c4b3f2
Accepting request 1327526 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2026-01-16 06:38:38 +00:00
1832c90288
- go1.24.12 (released 2026-01-15) includes security fixes to the go command, and the archive/zip, crypto/tls, and net/url packages, as well as bug fixes to the compiler, the runtime, and the crypto/tls and os packages. Refs boo#1236217 go1.24 release tracking CVE-2025-61726 CVE-2025-61728 CVE-2025-61730 CVE-2025-61731 CVE-2025-68119 CVE-2025-68121 * go#76854 go#76443 boo#1256821 security: fix CVE-2025-61730 crypto/tls: handshake messages may be processed at the incorrect encryption level * go#77103 go#77099 boo#1256820 security: fix CVE-2025-68119 cmd/go: unexpected code execution when invoking toolchain * go#77105 go#77100 boo#1256819 security: fix CVE-2025-61731 cmd/go: bypass of flag sanitization can lead to arbitrary code execution * go#77107 go#77101 boo#1256817 security: fix CVE-2025-61726 net/http: memory exhaustion in Request.ParseForm * go#77109 go#77102 boo#1256816 security: fix CVE-2025-61728 archive/zip: denial of service when parsing arbitrary ZIP archives * go#77114 go#77113 boo#1256818 security: fix CVE-2025-68121 crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386 * go#76796 runtime: race detector crash on ppc64le * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling <function>: runtime error: index out of range
Jeff Kowalczyk2026-01-16 06:38:38 +00:00
98a2c075e3
Accepting request 1327504 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2026-01-16 06:09:29 +00:00
eae3838b5d
- go1.24.12 (released 2026-01-15) includes security fixes to the go command, and the archive/zip, crypto/tls, and net/url packages, as well as bug fixes to the compiler, the runtime, and the crypto/tls and os packages. Refs boo#1236217 go1.24 release tracking CVE-2025-61726 CVE-2025-61728 CVE-2025-61730 CVE-2025-61731 CVE-2025-68119 CVE-2025-68121 * go#76854 go#76443 boo#1256821 security: fix CVE-2025-61730 crypto/tls: handshake messages may be processed at the incorrect encryption level * go#77103 go#77099 boo#1256820 security: fix CVE-2025-68119 cmd/go: unexpected code execution when invoking toolchain * go#77105 go#77100 boo#1256819 security: fix CVE-2025-61731 cmd/go: bypass of flag sanitization can lead to arbitrary code execution * go#77107 go#77101 boo#1256817 security: fix CVE-2025-61726 net/http: memory exhaustion in Request.ParseForm * go#77109 go#77102 boo#1256816 security: fix CVE-2025-61728 archive/zip: denial of service when parsing arbitrary ZIP archives * go#77114 go#77113 boo#1256818 security: fix CVE-2025-68121 crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386 * go#76796 runtime: race detector crash on ppc64le * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling <function>: runtime error: index out of range
Jeff Kowalczyk2026-01-16 06:09:29 +00:00
c87861629c
Accepting request 1320911 from devel:languages:go
Ana Guerrero2025-12-04 10:21:42 +00:00
526f6dd067
Accepting request 1320911 from devel:languages:go
Ana Guerrero2025-12-04 10:21:42 +00:00
0087bfd2f2
Accepting request 1320909 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-12-02 22:35:06 +00:00
8b8a84eb3e
- go1.24.11 (released 2025-12-02) includes two security fixes to the crypto/x509 package, as well as bug fixes to the runtime. Refs boo#1236217 go1.24 release tracking CVE-2025-61727 CVE-2025-61729 * go#76460 go#76445 boo#1254431 security: fix CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation * go#76463 go#76442 boo#1254430 security: fix CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN * go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause illegal instruction core dumps on LA364 cores
Jeff Kowalczyk2025-12-02 22:35:06 +00:00
e5fa002e1b
Accepting request 1320873 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-12-02 16:00:59 +00:00
a56c98800a
- Packaging: Migrate from update-alternatives to libalternatives Refs boo#1245878 * This is an optional migration controlled via prjconf definition with_libalternatives * If with_libalternatives is not defined packaging continues to use update-alternatives
Jeff Kowalczyk2025-12-02 16:00:59 +00:00
bf77164c6a
Accepting request 1316086 from devel:languages:go
Ana Guerrero2025-11-07 17:21:41 +00:00
53fea89bbf
Accepting request 1316086 from devel:languages:go
Ana Guerrero2025-11-07 17:21:41 +00:00
ac99d78d03
Accepting request 1316084 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-11-06 18:11:14 +00:00
d1f81cf747
- go1.24.10 (released 2025-11-05) includes fixes to the encoding/pem and net/url packages. Refs boo#1236217 go1.24 release tracking * go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets * go#75951 encoding/pem: regression when decoding blocks with leading garbage * go#76028 pem/encoding: malformed line endings can cause panics - Packaging improvements: * Remove net-url-allow-IP-literals-with-IPv4-mapped-IPv6-addresses.patch No longer needed with go#75831 in latest upstream release
Jeff Kowalczyk2025-11-06 18:11:14 +00:00
4ad2d09a0f
Accepting request 1316074 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-11-06 17:53:52 +00:00
725d06a641
- go1.24.10 (released 2025-11-05) includes fixes to the encoding/pem and net/url packages. * go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets * go#75951 encoding/pem: regression when decoding blocks with leading garbage * go#76028 pem/encoding: malformed line endings can cause panics - Packaging improvements: * Remove net-url-allow-IP-literals-with-IPv4-mapped-IPv6-addresses.patch No longer needed with go#75831 in latest upstream release
Jeff Kowalczyk2025-11-06 17:53:52 +00:00
530602aafb
Accepting request 1311560 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-10-15 23:19:18 +00:00
bdb4fec1ea
- go1.24.9 (released 2025-10-13) includes fixes to the crypto/x509 package. Refs boo#1236217 go1.24 release tracking * go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot - Packaging improvements: * Add net-url-allow-IP-literals-with-IPv4-mapped-IPv6-addresses.patch needed today and will be available in the next upstream release
Jeff Kowalczyk2025-10-15 23:19:18 +00:00
cf997ce4c3
Accepting request 1309723 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-10-08 04:48:52 +00:00
5615763b98
- go1.24.8 (released 2025-10-07) includes security fixes to the archive/tar, crypto/tls, crypto/x509, encoding/asn1, encoding/pem, net/http, net/mail, net/textproto, and net/url packages, as well as bug fixes to the compiler, the linker, and the debug/pe, net/http, os, and sync/atomic packages. Refs boo#1236217 go1.24 release tracking CVE-2025-58189 CVE-2025-61725 CVE-2025-58188 CVE-2025-58185 CVE-2025-58186 CVE-2025-61723 CVE-2025-58183 CVE-2025-47912 CVE-2025-58187 CVE-2025-61724 * go#75660 go#75652 boo#1251255 security: fix CVE-2025-58189 crypto/tls: ALPN negotiation error contains attacker controlled information * go#75700 go#75680 boo#1251253 security: fix CVE-2025-61725 net/mail: excessive CPU consumption in ParseAddress * go#75702 go#75675 boo#1251260 security: fix CVE-2025-58188 crypto/x509: panic when validating certificates with DSA public keys * go#75704 go#75671 boo#1251258 security: fix CVE-2025-58185 encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion * go#75706 go#75672 boo#1251259 security: fix CVE-2025-58186 net/http: lack of limit when parsing cookies can cause memory exhaustion * go#75708 go#75676 boo#1251256 security: fix CVE-2025-61723 encoding/pem: quadratic complexity when parsing some invalid inputs * go#75710 go#75677 boo#1251261 security: fix CVE-2025-58183 archive/tar: unbounded allocation when parsing GNU sparse map * go#75712 go#75678 boo#1251257 security: fix CVE-2025-47912 net/url: insufficient validation of bracketed IPv6 hostnames * go#75714 go#75681 boo#1251254 security: fix CVE-2025-58187 crypto/x509: quadratic complexity when checking name constraints * go#75717 go#75716 boo#1251262 security: fix CVE-2025-61724 net/textproto: excessive CPU consumption in Reader.ReadResponse * go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original root * go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21 * go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container symbol * go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9 * go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9 * go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail * go#75538 net/http: internal error: connCount underflow * go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn * go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return value
Jeff Kowalczyk2025-10-08 04:48:52 +00:00
183d9d114a
Accepting request 1306079 from devel:languages:go
Ana Guerrero2025-09-22 14:38:24 +00:00
03d575c325
Accepting request 1306079 from devel:languages:go
Ana Guerrero2025-09-22 14:38:24 +00:00
fea5ea1141
Accepting request 1306078 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-09-20 04:17:23 +00:00
bee461fb03
- Package svgpan.js to fix issues with "go tool pprof". boo#1249985
Jeff Kowalczyk2025-09-20 04:17:23 +00:00
63188ebaa9
Accepting request 1302805 from devel:languages:go
Ana Guerrero2025-09-08 07:56:35 +00:00
284d3071d7
Accepting request 1302805 from devel:languages:go
Ana Guerrero2025-09-08 07:56:35 +00:00
f62a65a44b
Accepting request 1302803 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-09-04 19:05:14 +00:00
aad9b950ba
- go1.24.7 (released 2025-09-03) includes fixes to the go command, and the net and os/exec packages. Refs boo#1236217 go1.24 release tracking * go#75007 os/exec: TestLookPath fails on plan9 after CL 685755 * go#74821 cmd/go: "get toolchain@latest" should ignore release candidates * go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets
Jeff Kowalczyk2025-09-04 19:05:14 +00:00
92fd72db9c
Accepting request 1298036 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-08-07 04:48:58 +00:00
3de5fee38d
- go1.24.6 (released 2025-08-06) includes security fixes to the database/sql and os/exec packages, as well as bug fixes to the runtime. Refs boo#1236217 go1.24 release tracking CVE-2025-47906 CVE-2025-47907 * go#74804 go#74466 boo#1247719 security: fix CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of "", "." and ".." in some PATH configurations * go#74833 go#74831 boo#1247720 security: fix CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan * go#73800 runtime: RSS seems to have increased in Go 1.24 while the runtime accounting has not * go#74416 runtime: use-after-free of allpSnapshot in findRunnable * go#74694 runtime: segfaults in runtime.(*unwinder).next * go#74760 os/user:nolibgcc: TestGroupIdsTestUser failures
Jeff Kowalczyk2025-08-07 04:48:58 +00:00
be45e56d58
Accepting request 1291362 from devel:languages:go
Ana Guerrero2025-07-09 15:26:28 +00:00
6b91690db2
Accepting request 1291362 from devel:languages:go
Ana Guerrero2025-07-09 15:26:28 +00:00
785a10d454
Accepting request 1291359 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-07-08 19:58:50 +00:00
c0f2e61b1b
Accepting request 1291359 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-07-08 19:58:50 +00:00
10a183a500
Accepting request 1283453 from devel:languages:go
Ana Guerrero2025-06-10 06:57:57 +00:00
7f1c468736
Accepting request 1283453 from devel:languages:go
Ana Guerrero2025-06-10 06:57:57 +00:00
280da74e4a
Accepting request 1283449 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-06-05 20:18:45 +00:00
4fb9b1b0fc
Accepting request 1283449 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-06-05 20:18:45 +00:00
b0d6891e0a
Accepting request 1275267 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-05-07 12:20:03 +00:00
6f56fe42f1
- go1.24.3 (released 2025-05-06) includes security fixes to the os package, as well as bug fixes to the runtime, the compiler, the linker, the go command, and the crypto/tls and os packages. Refs boo#1236217 go1.24 release tracking CVE-2025-22873 * go#73556 go#73555 boo#1242715 security: fix CVE-2025-22873 os: Root permits access to parent directory * go#73082 os: Root.Open panics when opening a symlink referencing the root * go#73092 cmd/link: linkname directive on userspace variable can override runtime variable * go#73118 crypto/tls: ECH decodeInnerClientHello incorrectly rejects ClientHello with GREASE values in supportedVersions * go#73144 runtime: segmentation fault from vgetrandomPutState and runtime.growslice w/ runtime.OSLockThread * go#73192 runtime: -race data race map traceback report incorrect functions * go#73281 cmd/compile: program compiles to wasm but is invalid: go:wasmexport: integer too large * go#73379 runtime, x/sys/unix: Connectx is broken on darwin/amd64 * go#73440 cmd/compile: infinite loop in the inliner * go#73500 cmd/go: +dirty in version stamping doesn't combine well with +incompatible - Packaging improvements: * Drop gh-issue-73141.patch to repair random segmentation faults (boo#1240764) fixed in upstream release.
Jeff Kowalczyk2025-05-07 12:20:03 +00:00
0c3920411f
Accepting request 1275044 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-05-07 03:48:19 +00:00
09f2ad1e7a
- go1.24.3 (released 2025-05-06) includes security fixes to the os package, as well as bug fixes to the runtime, the compiler, the linker, the go command, and the crypto/tls and os packages. Refs boo#1236217 go1.24 release tracking CVE-2025-22873 * go#73556 go#73555 boo#73555 security: fix CVE-2025-22873 os: Root permits access to parent directory * go#73082 os: Root.Open panics when opening a symlink referencing the root * go#73092 cmd/link: linkname directive on userspace variable can override runtime variable * go#73118 crypto/tls: ECH decodeInnerClientHello incorrectly rejects ClientHello with GREASE values in supportedVersions * go#73144 runtime: segmentation fault from vgetrandomPutState and runtime.growslice w/ runtime.OSLockThread * go#73192 runtime: -race data race map traceback report incorrect functions * go#73281 cmd/compile: program compiles to wasm but is invalid: go:wasmexport: integer too large * go#73379 runtime, x/sys/unix: Connectx is broken on darwin/amd64 * go#73440 cmd/compile: infinite loop in the inliner * go#73500 cmd/go: +dirty in version stamping doesn't combine well with +incompatible - Packaging improvements: * Drop gh-issue-73141.patch to repair random segmentation faults (boo#1240764) fixed in upstream release.
Jeff Kowalczyk2025-05-07 03:48:19 +00:00
d062b26d99
Accepting request 1272001 from devel:languages:go
Ana Guerrero2025-04-23 13:17:59 +00:00
5b7317fc74
Accepting request 1272001 from devel:languages:go
Ana Guerrero2025-04-23 13:17:59 +00:00
e0998cb3e3
Accepting request 1271898 from home:crameleon:boo1240764
Jeff Kowalczyk2025-04-22 17:51:41 +00:00
6d36d10314
Add gh-issue-73141.patch to repair random segmentation faults (boo#1240764)
Jeff Kowalczyk2025-04-22 17:51:41 +00:00
b9582af621
Accepting request 1266903 from devel:languages:go
Ana Guerrero2025-04-03 16:43:15 +00:00
0ede28fe6c
Accepting request 1266903 from devel:languages:go
Ana Guerrero2025-04-03 16:43:15 +00:00
773ada0f0a
Accepting request 1266902 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-04-03 13:49:39 +00:00
30c5d867ff
- Packaging improvements: * SLE-12 only: Fix conditional for go-fixsecomp.patch to work correctly when suse_version is undefined. Refs boo#1239182 * Fix RPM warning by removing valid macro syntax in comment describing naming format of llvm-tsan_commit.tar.xz
Jeff Kowalczyk2025-04-03 13:49:39 +00:00
5bb05ce002
Accepting request 1266346 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-04-02 02:35:31 +00:00
d9c092aa3c
- go1.24.2 (released 2025-04-01) includes security fixes to the net/http package, as well as bug fixes to the compiler, the runtime, the go command, and the crypto/tls, go/types, net/http, and testing packages. Refs boo#1236217 go1.24 release tracking CVE-2025-22871 * go#72011 go#71988 boo#1240550 security: fix CVE-2025-22871 net/http: reject bare LF in chunked encoding * go#72067 cmd/compile: out of memory * go#72103 net/http: go1.24 breaks compatibility by modifying in-place the tls.Config{NextProtos} * go#72115 runtime: process hangs for mips hardware * go#72796 runtime: add an example for AddCleanup * go#72822 cmd/compile: OOM with mutually-recursive iter.Seq * go#72823 crypto/tls: FIPS 140-3 modes reject ECDSA w/ curve P-521/SHA-512 in TLS * go#72826 go/types, types2: CheckExpr / Eval may mutate type checked objects (=> data race) * go#72872 runtime: cgo callback on extra M treated as external code after nested cgo callback returns * go#72934 testing: b.StopTimer breaks b.Loop * go#72938 internal/godebugs: winsymlink and winreadlinkvolume have incorrect defaults for Go 1.22 * go#72974 testing: b.Loop gives bogus results in some situations - Packaging improvements: * SLE-12 only: Add declarations to Cgo seccomp_linux.go for new syscalls seccomp and getrandom which are not present in the kernel headers supplied by glibc version in SLE-12. (Marcus Meissner) Refs boo#1239182 * Add patch go-fixseccomp.patch
Jeff Kowalczyk2025-04-02 02:35:31 +00:00
3c7cf6aead
Accepting request 1266333 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-04-01 21:39:02 +00:00
0b0b9b7fdb
- go1.24.2 (released 2025-04-01) includes security fixes to the net/http package, as well as bug fixes to the compiler, the runtime, the go command, and the crypto/tls, go/types, net/http, and testing packages. Refs boo#1236217 go1.24 release tracking CVE-2025-22871 * go#72011 go#71988 boo#1240550 security: fix CVE-2025-22871 net/http: reject bare LF in chunked encoding * go#72067 cmd/compile: out of memory * go#72103 net/http: go1.24 breaks compatibility by modifying in-place the tls.Config{NextProtos} * go#72115 runtime: process hangs for mips hardware * go#72796 runtime: add an example for AddCleanup * go#72822 cmd/compile: OOM with mutually-recursive iter.Seq * go#72823 crypto/tls: FIPS 140-3 modes reject ECDSA w/ curve P-521/SHA-512 in TLS * go#72826 go/types, types2: CheckExpr / Eval may mutate type checked objects (=> data race) * go#72872 runtime: cgo callback on extra M treated as external code after nested cgo callback returns * go#72934 testing: b.StopTimer breaks b.Loop * go#72938 internal/godebugs: winsymlink and winreadlinkvolume have incorrect defaults for Go 1.22 * go#72974 testing: b.Loop gives bogus results in some situations
Jeff Kowalczyk2025-04-01 21:39:02 +00:00
4c8bd4d2e8
Accepting request 1250292 from devel:languages:go
Ana Guerrero2025-03-06 13:48:19 +00:00
5cea8661a1
Accepting request 1250292 from devel:languages:go
Ana Guerrero2025-03-06 13:48:19 +00:00
73fb391090
Accepting request 1250289 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-03-05 03:44:58 +00:00
05a008975c
- go1.24.1 (released 2025-03-04) includes security fixes to the net/http, x/net/proxy, and x/net/http/httpproxy packages, as well as bug fixes to the compiler, the runtime, the go command and the crypto, debug, os and reflect packages. Refs boo#1236217 go1.24 release tracking CVE-2025-22870 * go#71986 go#71984 boo#1238572 security: fix CVE-2025-22870 net/http, x/net/proxy, x/net/http/httpproxy: proxy bypass using IPv6 zone IDs * go#71687 cmd/go: panics with GOAUTH='git dir' go get -x * go#71705 runtime: add linkname of runtime.lastmoduledatap for cloudwego/sonic * go#71728 runtime: usleep computes wrong tv_nsec on s390x * go#71745 crypto: add fips140 as an opaque GODEBUG setting and add documentation for it * go#71829 cmd/compile: fail to compile package in 1.24 * go#71836 os: possible regression from Go 1.23 to Go 1.24 when opening DevNull with O_TRUNC * go#71840 runtime: recover added in range-over-func loop body doesn't stop panic propagation / segfaults printing error * go#71849 os: spurious SIGCHILD on running child process * go#71855 cmd/compile: Pow10 freeze the compiler on certain condition on Go 1.24 * go#71858 debug/buildinfo: false positives with external scanners flag for go117 binary in testdata * go#71876 reflect: Value.Seq panicking on functional iterator methods * go#71904 cmd/compile: nil dereference when storing field of non-nil struct value * go#71916 reflect: Value.Seq iteration value types not matching the type of given int types * go#71938 cmd/compile: "fatal error: found pointer to free object" on arm64 * go#71955 proposal: runtime: allow cleanups to run concurrently * go#71963 runtime/cgo: does not build with -Wdeclaration-after-statement * go#71977 syscall: js/wasm file operations fail on windows / node.js
Jeff Kowalczyk2025-03-05 03:44:58 +00:00
a22e3cbe04
Accepting request 1250286 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-03-05 03:39:01 +00:00
9a319c14c8
- go1.24.1 (released 2025-03-04) includes security fixes to the net/http, x/net/proxy, and x/net/http/httpproxy packages, as well as bug fixes to the compiler, the runtime, the go command and the crypto, debug, os and reflect packages. Refs boo#1236217 go1.24 release tracking CVE-2025-22870 * go#71986 go#71984 boo#1238572 security: fix CVE-2025-22870 net/http, x/net/proxy, x/net/http/httpproxy: proxy bypass using IPv6 zone IDs * go#71977 syscall: js/wasm file operations fail on windows / node.js * go#71963 runtime/cgo: does not build with -Wdeclaration-after-statement * go#71955 proposal: runtime: allow cleanups to run concurrently * go#71938 cmd/compile: "fatal error: found pointer to free object" on arm64 * go#71916 reflect: Value.Seq iteration value types not matching the type of given int types * go#71904 cmd/compile: nil dereference when storing field of non-nil struct value * go#71876 reflect: Value.Seq panicking on functional iterator methods * go#71858 debug/buildinfo: false positives with external scanners flag for go117 binary in testdata * go#71855 cmd/compile: Pow10 freeze the compiler on certain condition on Go 1.24 * go#71849 os: spurious SIGCHILD on running child process * go#71840 runtime: recover added in range-over-func loop body doesn't stop panic propagation / segfaults printing error * go#71836 os: possible regression from Go 1.23 to Go 1.24 when opening DevNull with O_TRUNC * go#71829 cmd/compile: fail to compile package in 1.24 * go#71745 crypto: add fips140 as an opaque GODEBUG setting and add documentation for it * go#71728 runtime: usleep computes wrong tv_nsec on s390x * go#71705 runtime: add linkname of runtime.lastmoduledatap for cloudwego/sonic * go#71687 cmd/go: panics with GOAUTH='git dir' go get -x
Jeff Kowalczyk2025-03-05 03:39:01 +00:00
56ce77c715
Accepting request 1245176 from devel:languages:go
Ana Guerrero2025-02-12 20:31:31 +00:00
2569d37970
Accepting request 1245176 from devel:languages:go
Ana Guerrero2025-02-12 20:31:31 +00:00
6b1c4a27ba
Accepting request 1245175 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-02-11 22:04:57 +00:00
0907eed490
- go1.24 (released 2025-02-11) is a major release of Go. go1.24.x minor releases will be provided through February 2026. https://github.com/golang/go/wiki/Go-Release-Cycle go1.24 arrives six months after Go 1.23. Most of its changes are in the implementation of the toolchain, runtime, and libraries. As always, the release maintains the Go 1 promise of compatibility. We expect almost all Go programs to continue to compile and run as before. Refs boo#1236217 go1.24 release tracking
Jeff Kowalczyk2025-02-11 22:04:57 +00:00
0d7525e730
Accepting request 1243516 from devel:languages:go
Ana Guerrero2025-02-06 21:07:49 +00:00
92ce92ba6a
Accepting request 1243516 from devel:languages:go
Ana Guerrero2025-02-06 21:07:49 +00:00
6caa8cdde0
Accepting request 1243515 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-02-05 22:12:11 +00:00
b764809bf6
- go1.24rc3 (released 2024-02-05) is a release candidate version of go1.24 cut from the master branch at the revision tagged go1.24rc3. Refs boo#1236217 go1.24 release tracking CVE-2025-22866 CVE-2025-22867 * go#71423 go#71383 boo#1236801 security: fix CVE-2025-22866 crypto/internal/fips140/nistec: p256NegCond is variable time on ppc64le * go#71476 boo#1236839 security: fix CVE-2025-22867 cmd/go: arbitrary code execution during build on darwin
Jeff Kowalczyk2025-02-05 22:12:11 +00:00