fc4144013d
Accepting request 1332053 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2026-02-09 14:25:05 +00:00
9d5f847501
Accepting request 1327532 from devel:languages:go
Ana Guerrero2026-01-18 21:18:28 +00:00
408dc17bad
Accepting request 1327532 from devel:languages:go
Ana Guerrero2026-01-18 21:18:28 +00:00
1800a38fbb
Accepting request 1327527 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2026-01-16 06:38:58 +00:00
10e6a054ee
- go1.25.6 (released 2026-01-15) includes security fixes to the go command, and the archive/zip, crypto/tls, and net/url packages, as well as bug fixes to the compiler, the runtime, and the crypto/tls, errors, and os packages. Refs boo#1244485 go1.25 release tracking CVE-2025-61726 CVE-2025-61728 CVE-2025-61730 CVE-2025-61731 CVE-2025-68119 CVE-2025-68121 * go#76855 go#76443 boo#1256821 security: fix CVE-2025-61730 crypto/tls: handshake messages may be processed at the incorrect encryption level * go#77104 go#77099 boo#1256820 security: fix CVE-2025-68119 cmd/go: unexpected code execution when invoking toolchain * go#77106 go#77100 boo#1256819 security: fix CVE-2025-61731 cmd/go: bypass of flag sanitization can lead to arbitrary code execution * go#77108 go#77101 boo#1256817 security: fix CVE-2025-61726 net/http: memory exhaustion in Request.ParseForm * go#77110 go#77102 boo#1256816 security: fix CVE-2025-61728 archive/zip: denial of service when parsing arbitrary ZIP archives * go#77115 go#77113 boo#1256818 security: fix CVE-2025-68121 crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain * go#76392 os: package initialization hangs is Stdin is blocked * go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled * go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes * go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386 * go#76776 runtime: race detector crash on ppc64le * go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling <function>: runtime error: index out of range * go#76973 errors: errors.Join behavior changed in 1.25
Jeff Kowalczyk2026-01-16 06:38:58 +00:00
cb3fe35c0a
Accepting request 1327505 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2026-01-16 06:09:37 +00:00
6ad6eff4cd
- go1.25.6 (released 2026-01-15) includes security fixes to the go command, and the archive/zip, crypto/tls, and net/url packages, as well as bug fixes to the compiler, the runtime, and the crypto/tls, errors, and os packages. Refs boo#1244485 go1.25 release tracking CVE-2025-61726 CVE-2025-61728 CVE-2025-61730 CVE-2025-61731 CVE-2025-68119 CVE-2025-68121 * go#76855 go#76443 boo#1256821 security: fix CVE-2025-61730 crypto/tls: handshake messages may be processed at the incorrect encryption level * go#77104 go#77099 boo#1256820 security: fix CVE-2025-68119 cmd/go: unexpected code execution when invoking toolchain * go#77106 go#77100 boo#1256819 security: fix CVE-2025-61731 cmd/go: bypass of flag sanitization can lead to arbitrary code execution * go#77108 go#77101 boo#1256817 security: fix CVE-2025-61726 net/http: memory exhaustion in Request.ParseForm * go#77110 go#77102 boo#1256816 security: fix CVE-2025-61728 archive/zip: denial of service when parsing arbitrary ZIP archives * go#77115 go#77113 boo#1256818 security: fix CVE-2025-68121 crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain * go#76392 os: package initialization hangs is Stdin is blocked * go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled * go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes * go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386 * go#76776 runtime: race detector crash on ppc64le * go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling <function>: runtime error: index out of range * go#76973 errors: errors.Join behavior changed in 1.25
Jeff Kowalczyk2026-01-16 06:09:37 +00:00
4b92846ade
Accepting request 1320929 from devel:languages:go
Ana Guerrero2025-12-03 13:12:13 +00:00
43bba29985
Accepting request 1320929 from devel:languages:go
Ana Guerrero2025-12-03 13:12:13 +00:00
c6587946c9
Accepting request 1320928 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-12-03 05:17:38 +00:00
5088174b55
- go1.25.5 (released 2025-12-02) includes two security fixes to the crypto/x509 package, as well as bug fixes to the mime and os packages. Refs boo#1244485 go1.25 release tracking CVE-2025-61729 CVE-2025-61727 * go#76461 go#76445 boo#1254431 security: fix CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation * go#76464 go#76442 boo#1254430 security: fix CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN * go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25 * go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied, ReOpenFile error handling followup
Jeff Kowalczyk2025-12-03 05:17:38 +00:00
864eae5b01
Accepting request 1320910 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-12-02 22:35:14 +00:00
5ff0e5b6d9
- go1.25.5 (released 2025-12-02) includes two security fixes to the crypto/x509 package, as well as bug fixes to the mime and os packages. Refs boo#1244485 go1.25 release tracking * go#76461 go#76445 boo#1254431 security: fix CVE-2025-61729 crypto/x509: excessive resource consumption in printing error string for host certificate validation * go#76464 go#76442 boo#1254430 security: fix CVE-2025-61727 crypto/x509: excluded subdomain constraint doesn't preclude wildcard SAN * go#76245 mime: FormatMediaType and ParseMediaType not compatible across 1.24 to 1.25 * go#76360 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied, ReOpenFile error handling followup
Jeff Kowalczyk2025-12-02 22:35:14 +00:00
446002ec66
Accepting request 1320780 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-12-01 22:52:57 +00:00
e26fff475b
- Packaging: Migrate from update-alternatives to libalternatives Refs boo#1245878 * This is an optional migration controlled via prjconf definition with_libalternatives * If with_libalternatives is not defined packaging continues to use update-alternatives
Jeff Kowalczyk2025-12-01 22:52:57 +00:00
20195e80bd
Accepting request 1320154 from devel:languages:go
Ana Guerrero2025-11-27 14:17:46 +00:00
dbf1aaae46
Accepting request 1320154 from devel:languages:go
Ana Guerrero2025-11-27 14:17:46 +00:00
a00ea47e81
Accepting request 1320109 from home:dimstar:Factory
Jeff Kowalczyk2025-11-26 11:00:14 +00:00
3227258998
- Fix runtime condition for gcc/gcc7 dependency.
Jeff Kowalczyk2025-11-26 11:00:14 +00:00
6e88011c75
Accepting request 1320013 from home:msmeissn:branches:devel:languages:go
Jeff Kowalczyk2025-11-25 14:13:57 +00:00
473be0f077
- On SLE 12, s390x needs at least gcc 7. But lets use it for all architectures. (bsc#1254227)
Jeff Kowalczyk2025-11-25 14:13:57 +00:00
11a14b4641
Accepting request 1316087 from devel:languages:go
Ana Guerrero2025-11-07 17:21:44 +00:00
78d1dbed94
Accepting request 1316087 from devel:languages:go
Ana Guerrero2025-11-07 17:21:44 +00:00
97ab0dd441
Accepting request 1316085 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-11-06 18:11:48 +00:00
99a76b3fd2
- go1.25.4 (released 2025-11-05) includes fixes to the compiler, the runtime, and the crypto/subtle, encoding/pem, net/url, and os packages. Refs boo#1244485 go1.25 release tracking * go#75480 cmd/link: linker panic and relocation errors with complex generics inlining * go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64 * go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS * go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets * go#75952 encoding/pem: regression when decoding blocks with leading garbage * go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied * go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should * go#76029 pem/encoding: malformed line endings can cause panics - Packaging improvements: * Remove net-url-allow-IP-literals-with-IPv4-mapped-IPv6-addresses.patch No longer needed with go#75832 in latest upstream release
Jeff Kowalczyk2025-11-06 18:11:48 +00:00
6c6e018ad8
Accepting request 1316075 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-11-06 17:54:08 +00:00
98775a5e70
- go1.25.4 (released 2025-11-05) includes fixes to the compiler, the runtime, and the crypto/subtle, encoding/pem, net/url, and os packages. * go#75480 cmd/link: linker panic and relocation errors with complex generics inlining * go#75775 runtime: build fails when run via QEMU for linux/amd64 running on linux/arm64 * go#75790 crypto/internal/fips140/subtle: Go 1.25 subtle.xorBytes panic on MIPS * go#75832 net/url: ipv4 mapped ipv6 addresses should be valid in square brackets * go#75952 encoding/pem: regression when decoding blocks with leading garbage * go#75989 os: on windows RemoveAll removing directories containing read-only files errors with unlinkat ... Access is denied * go#76010 cmd/compile: any(func(){})==any(func(){}) does not panic but should * go#76029 pem/encoding: malformed line endings can cause panics - Packaging improvements: * Remove net-url-allow-IP-literals-with-IPv4-mapped-IPv6-addresses.patch No longer needed with go#75832 in latest upstream release
Jeff Kowalczyk2025-11-06 17:54:08 +00:00
72f48371e9
Accepting request 1311561 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-10-15 23:19:42 +00:00
fc0ddc85cb
- go1.25.3 (released 2025-10-13) includes fixes to the crypto/x509 package. Refs boo#1244485 go1.25 release tracking * go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot * go#75777 spec: Go1.25 spec should be dated closer to actual release date - Packaging improvements: * Add net-url-allow-IP-literals-with-IPv4-mapped-IPv6-addresses.patch needed today and will be available in the next upstream release
Jeff Kowalczyk2025-10-15 23:19:42 +00:00
10e8f98588
Accepting request 1311264 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-10-14 02:20:34 +00:00
bbd41423ed
- go1.25.3 (released 2025-10-13) includes fixes to the crypto/x509 package. Refs boo#1244485 go1.25 release tracking * go#75861 crypto/x509: TLS validation fails for FQDNs with trailing dot * go#75777 spec: Go1.25 spec should be dated closer to actual release date
Jeff Kowalczyk2025-10-14 02:20:34 +00:00
eebd4ecec4
Accepting request 1309724 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-10-08 04:49:02 +00:00
ea041d45bf
- go1.25.2 (released 2025-10-07) includes security fixes to the archive/tar, crypto/tls, crypto/x509, encoding/asn1, encoding/pem, net/http, net/mail, net/textproto, and net/url packages, as well as bug fixes to the compiler, the runtime, and the context, debug/pe, net/http, os, and sync/atomic packages. Refs boo#1244485 go1.25 release tracking CVE-2025-58189 CVE-2025-61725 CVE-2025-58188 CVE-2025-58185 CVE-2025-58186 CVE-2025-61723 CVE-2025-58183 CVE-2025-47912 CVE-2025-58187 CVE-2025-61724 * go#75661 go#75652 boo#1251255 security: fix CVE-2025-58189 crypto/tls: ALPN negotiation error contains attacker controlled information * go#75701 go#75680 boo#1251253 security: fix CVE-2025-61725 net/mail: excessive CPU consumption in ParseAddress * go#75703 go#75675 boo#1251260 security: fix CVE-2025-58188 crypto/x509: panic when validating certificates with DSA public keys * go#75705 go#75671 boo#1251258 security: fix CVE-2025-58185 encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion * go#75707 go#75672 boo#1251259 security: fix CVE-2025-58186 net/http: lack of limit when parsing cookies can cause memory exhaustion * go#75709 go#75676 boo#1251256 security: fix CVE-2025-61723 encoding/pem: quadratic complexity when parsing some invalid inputs * go#75711 go#75677 boo#1251261 security: fix CVE-2025-58183 archive/tar: unbounded allocation when parsing GNU sparse map * go#75713 go#75678 boo#1251257 security: fix CVE-2025-47912 net/url: insufficient validation of bracketed IPv6 hostnames * go#75715 go#75681 boo#1251254 security: fix CVE-2025-58187 crypto/x509: quadratic complexity when checking name constraints * go#75718 go#75716 boo#1251262 security: fix CVE-2025-61724 net/textproto: excessive CPU consumption in Reader.ReadResponse * go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt * go#75116 os: Root.MkdirAll can return "file exists" when called concurrently on the same path * go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root * go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21 * go#75255 cmd/compile: export to DWARF types only referenced through interfaces * go#75347 testing/synctest: test timeout with no runnable goroutines * go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9 * go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail * go#75537 context: Err can return non-nil before Done channel is closed * go#75539 net/http: internal error: connCount underflow * go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn * go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value * go#75669 runtime: debug.decoratemappings don't work as expected
Jeff Kowalczyk2025-10-08 04:49:02 +00:00
6c701a1119
Accepting request 1306041 from home:cyphar:go
Jeff Kowalczyk2025-09-19 16:40:41 +00:00
503113650d
- Package svgpan.js to fix issues with "go tool pprof". boo#1249985
Jeff Kowalczyk2025-09-19 16:40:41 +00:00
34a7b733ec
Accepting request 1302806 from devel:languages:go
Ana Guerrero2025-09-05 19:43:22 +00:00
939b18b9c8
Accepting request 1302806 from devel:languages:go
Ana Guerrero2025-09-05 19:43:22 +00:00
72531e9799
Accepting request 1302804 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-09-04 19:05:32 +00:00
b1a5692a88
- go1.25.1 (released 2025-09-03) includes security fixes to the net/http package, as well as bug fixes to the go command, and the net, os, os/exec, and testing/synctest packages. Refs boo#1244485 go1.25 release tracking CVE-2025-47910 * go#75160 go#75054 boo#1249141 security: fix CVE-2025-47910 net/http: CrossOriginProtection insecure bypass patterns not limited to exact matches * go#74822 cmd/go: "get toolchain@latest" should ignore release candidates * go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets * go#75008 os/exec: TestLookPath fails on plan9 after CL 685755 * go#75021 testing/synctest: bubble not terminating * go#75083 os: File.Seek doesn't set the correct offset with Windows overlapped handles
Jeff Kowalczyk2025-09-04 19:05:32 +00:00
b3def9352c
Accepting request 1300145 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-08-18 20:14:38 +00:00
aefc4b709f
Accepting request 1300145 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-08-18 20:14:38 +00:00
4cf8aef1b8
Accepting request 1299278 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-08-13 19:38:03 +00:00
9ea33de623
- go1.25 (released 2025-08-12) is a major release of Go. go1.25.x minor releases will be provided through August 2026. https://github.com/golang/go/wiki/Go-Release-Cycle go1.25 arrives six months after Go 1.24. Most of its changes are in the implementation of the toolchain, runtime, and libraries. As always, the release maintains the Go 1 promise of compatibility. We expect almost all Go programs to continue to compile and run as before. Refs boo#1244485 go1.25 release tracking * Language changes: There are no languages changes that affect Go programs in Go 1.25. However, in the language specification the notion of core types has been removed in favor of dedicated prose. See the respective blog post for more information. * go command: The go build -asan option now defaults to doing leak detection at program exit. This will report an error if memory allocated by C is not freed and is not referenced by any other memory allocated by either C or Go. These new error reports may be disabled by setting ASAN_OPTIONS=detect_leaks=0 in the environment when running the program. * go command: The Go distribution will include fewer prebuilt tool binaries. Core toolchain binaries such as the compiler and linker will still be included, but tools not invoked by build or test operations will be built and run by go tool as needed. * go command: The new go.mod ignore directive can be used to specify directories the go command should ignore. Files in these directories and their subdirectories will be ignored by the go command when matching package patterns, such as all or ./..., but will still be included in module zip files. * go command: The new go doc -http option will start a documentation server showing documentation for the requested
Jeff Kowalczyk2025-08-13 19:38:03 +00:00
432a6ef922
Accepting request 1298037 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-08-07 04:49:44 +00:00
b00454482c
- go1.25rc3 (released 2025-08-06) is a release candidate version of go1.25 cut from the master branch at the revision tagged go1.25rc3. Refs boo#1244485 go1.25 release tracking CVE-2025-47906 CVE-2025-47907 * go#74466 boo#1247719 security: fix CVE-2025-47906 os/exec: LookPath bug: incorrect expansion of "", "." and ".." in some PATH configurations * go#74831 boo#1247720 security: fix CVE-2025-47907 database/sql: incorrect results returned from Rows.Scan
Jeff Kowalczyk2025-08-07 04:49:44 +00:00
0ffbccb4ba
Accepting request 1291363 from devel:languages:go
Ana Guerrero2025-07-09 15:28:12 +00:00
a86a59f7e7
Accepting request 1291363 from devel:languages:go
Ana Guerrero2025-07-09 15:28:12 +00:00
43d3a3d050
Accepting request 1291360 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-07-08 19:59:11 +00:00
df367520b9
Accepting request 1291360 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-07-08 19:59:11 +00:00
ec231b4159
Accepting request 1285203 from devel:languages:go
Ana Guerrero2025-06-13 16:43:56 +00:00
3d8cb60033
Accepting request 1285203 from devel:languages:go
Ana Guerrero2025-06-13 16:43:56 +00:00
18a9896c9d
Accepting request 1284965 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-06-12 02:40:10 +00:00
50b114f965
Accepting request 1284965 from home:jfkw:branches:devel:languages:go
Jeff Kowalczyk2025-06-12 02:40:10 +00:00