51 Commits

Author SHA1 Message Date
hanchao
7e7f663d4b backport: fix CVE-2024-24784 2024-03-28 18:35:18 +08:00
hanchao
24ce46ddd0 bugfix: enabling the patching function 2024-03-28 18:35:13 +08:00
zhangwenlong01
1628c33a1f fix build error for loongarch64
Signed-off-by: zhangwenlong01 <zhangwenlong@loongson.cn>
(cherry picked from commit ab448e9c4c9ac0f334fd4fc519e73c193597fcc8)
2024-03-28 09:18:26 +08:00
hanchao
5f0e9e311b backport: fix CVE-2024-24783,CVE-2024-24785,CVE-2023-45290,CVE-2023-45289 2024-03-15 16:41:17 +08:00
jiahua.yu
89e31d4307 Init support for arch ppc64le 2023-12-13 10:31:08 +08:00
hanchao
f514094aa2 upgrade to 1.21.4 2023-12-05 14:37:44 +08:00
wanglimin
007faac7bf permit requests with invalid Host headers 2023-08-24 18:17:26 +08:00
root
c79107b0b3 1.20.7 2023-08-07 16:01:31 +08:00
Funda Wang
cf15318291 Use local proxy and sumdb for speed up 2023-07-31 19:55:14 +08:00
sunchendong
f494134fe5 cvefix:fix CVE-2023-29406 2023-07-24 15:46:40 +08:00
hanchao
3f8235235e update: update to go1.20.5 2023-07-03 19:23:36 +08:00
zhangzhihui
f1b37a1aac [Backport] fix some CVE
CVE num	        upstream commit	                          openEuler patch
CVE-2023-29400	9db0e74f606b8afb28cc71d4b1c8b4ed24cabbf5	0016-release-branch.go1.19-html-template-emit-filterFails.patch
CVE-2023-24540	ce7bd33345416e6d8cac901792060591cafc2797	0015-release-branch.go1.19-html-template-handle-all-JS-wh.patch
CVE-2023-24539	e49282327b05192e46086bf25fd3ac691205fe80	0014-release-branch.go1.19-html-template-disallow-angle-b.patch
CVE-2023-24538	b1e3ecfa06b67014429a197ec5e134ce4303ad9b	0013-release-branch.go1.19-html-template-disallow-actions.patch
CVE-2023-24537	126a1d02da82f93ede7ce0bd8d3c51ef627f2104	0012-release-branch.go1.19-go-scanner-reject-large-line-a.patch
CVE-2023-24536	7917b5f31204528ea72e0629f0b7d52b35b27538	0011-release-branch.go1.19-mime-multipart-limit-parsed-mi.patch
CVE-2023-24536	7a359a651c7ebdb29e0a1c03102fce793e9f58f0	0010-release-branch.go1.19-net-textproto-mime-multipart-i.patch
CVE-2023-24536	ef41a4e2face45e580c5836eaebd51629fc23f15	0009-release-branch.go1.19-mime-multipart-avoid-excessive.patch
CVE-2023-24534	d6759e7a059f4208f07aa781402841d7ddaaef96	0008-release-branch.go1.19-net-textproto-avoid-overpredic.patch
CVE-2023-24532	639b67ed114151c0d786aa26e7faeab942400703	0007-release-branch.go1.19-crypto-internal-nistec-reduce-.patch
CVE-2022-41723	5c3e11bd0b5c0a86e5beffcd4339b86a902b21c3	0006-release-branch.go1.19-net-http-update-bundled-golang.patch
CVE-2022-41724	00b256e9e3c0fa02a278ec9dfc3e191e02ceaf80	0005-release-branch.go1.19-crypto-tls-replace-all-usages-.patch
CVE-2022-41725	5c55ac9bf1e5f779220294c843526536605f42ab	0004-release-branch.go1.19-mime-multipart-limit-memory-in.patch
CVE-2022-41722	3345ddca41f00f9ed6fc3c1a36f6e2bede02d7ff	0003-release-branch.go1.19-path-filepath-do-not-Clean-a-..patch

Signed-off-by: zhangzhihui <zhangzhihui@xfusion.com>
2023-05-10 17:38:15 +08:00
ChendongSun
6d0f92022c fix CVE-2023-24534 2023-04-25 08:34:49 +08:00
ChendongSun
771692cd56 fix CVE-2023-24538 2023-04-13 19:41:12 +08:00
ChendongSun
eea5870153 golang: fix CVE-2023-24537 2023-04-13 13:36:11 +08:00
misaka00251
044dd36e7d
Enable go plugin support & upstream sv57 enablement for riscv64 2023-04-03 15:08:19 +08:00
hanchao
bf9ade514f golang: upgrade to golang1.19.4 2023-01-10 19:24:04 +08:00
wanglimin
a7f58e6f18 support Cut in bytes,strings 2022-12-21 14:46:41 +08:00
hanchao
9bab37fbc7 golang: remove hard code and strong dependency of git, subversion and mercurial 2022-11-21 16:40:44 +08:00
hanchao
76ac33e67e golang: fix CVE-2022-41716
Score: 7.5
Reference: https://go-review.googlesource.com/c/go/+/446916
Conflict: src/os/exec/exec.go;src/syscall/exec_windows.go
Reason: fix CVE-2022-41716
2022-11-17 13:05:07 +08:00
hanchao
4fd46fe7b9 golang: fix CVE-2022-41715,CVE-2022-2880,CVE-2022-2879
Score:CVE-2022-41715:4,CVE-2022-2880:5.3,CVE-2022-2879:6.2
Reference:https://go-review.googlesource.com/c/go/+/438501,
	https://go-review.googlesource.com/c/go/+/433695,
	https://go-review.googlesource.com/c/go/+/438500
Conflict:NA
Reason:fix CVE-2022-41715,CVE-2022-2880,CVE-2022-2879
2022-10-12 18:24:08 +08:00
hanchao
793f4d493d golang: fix CVE-2022-27664
Score: 7.5
Reference: https://go-review.googlesource.com/c/go/+/428635/
Conflict: NA
Reason: fix CVE-2022-27664
2022-09-15 10:29:01 +08:00
hanchao
eac443ba4a golang: modify the golang.spec to remove unnecessary files from
golang-help package

Reason: golang-help package include unnecessary files such as shared
libs. now remove those unnecessary files.
2022-09-08 21:14:05 +08:00
hanchao
282de33531 golang: fix CVE-2022-29804,CVE-2022-29526
Score: CVE-2022-29804: 7.5, CVE-2022-29526: 5.3
Reference: https://go-review.googlesource.com/c/go/+/401595/, https://go-review.googlesource.com/c/go/+/401078/
Conflict: NA
Reason: fix CVE-2022-29804,CVE-2022-29526
2022-09-08 20:04:30 +08:00
hanchao
6dd57444d5 golang: fix CVE-2022-32189
Score: 6.5
Reference: https://go-review.googlesource.com/c/go/+/419814
Conflict: NA
Reason: fix CVE-2022-32189
2022-09-08 20:04:16 +08:00
hanchao
40c91388a1 golang: fix CVE-2022-32148,CVE-2022-1962,CVE-2022-1705,CVE-2022-30633,
CVE-2022-30635,CVE-2022-30630,CVE-2022-30632,CVE-2022-28131,
CVE-2022-30631,CVE-2022-30629,CVE-2022-30634

Conflict: NA

Score:
CVE-2022-32148: 5.3
CVE-2022-1962:  6.2
CVE-2022-1705:  5.3
CVE-2022-30633: 6.2
CVE-2022-30635: 5.5
CVE-2022-30630: 6.2
CVE-2022-30632: 6.2
CVE-2022-28131: 6.2
CVE-2022-30631: 7.5
CVE-2022-30629: 2.6
CVE-2022-30634: 7.5

Reference:
CVE-2022-32148: https://go-review.googlesource.com/c/go/+/415221
CVE-2022-1962:	https://go-review.googlesource.com/c/go/+/417070
CVE-2022-1705:  https://go-review.googlesource.com/c/go/+/415217
CVE-2022-30633: https://go-review.googlesource.com/c/go/+/417069
CVE-2022-30635: https://go-review.googlesource.com/c/go/+/417074
CVE-2022-30630: https://go-review.googlesource.com/c/go/+/417072
CVE-2022-30632: https://go-review.googlesource.com/c/go/+/417073
CVE-2022-28131: https://go-review.googlesource.com/c/go/+/417068
CVE-2022-30631: https://go-review.googlesource.com/c/go/+/417071
CVE-2022-30629: https://go-review.googlesource.com/c/go/+/408574
CVE-2022-30634: https://go-review.googlesource.com/c/go/+/406635

Reason: fix CVE:
CVE-2022-32148: 0005-release-branch.go1.17-net-http-preserve-nil-values-i.patch
CVE-2022-1962:	0006-release-branch.go1.17-go-parser-limit-recursion-dept.patch
CVE-2022-1705:  0007-release-branch.go1.17-net-http-don-t-strip-whitespac.patch
CVE-2022-30633: 0008-release-branch.go1.17-encoding-xml-limit-depth-of-ne.patch
CVE-2022-30635: 0009-release-branch.go1.17-encoding-gob-add-a-depth-limit.patch
CVE-2022-30630: 0010-release-branch.go1.17-io-fs-fix-stack-exhaustion-in-.patch
CVE-2022-30632: 0011-release-branch.go1.17-path-filepath-fix-stack-exhaus.patch
CVE-2022-28131: 0012-release-branch.go1.17-encoding-xml-use-iterative-Ski.patch
CVE-2022-30631: 0013-release-branch.go1.17-compress-gzip-fix-stack-exhaus.patch
CVE-2022-30629: 0014-release-branch.go1.17-crypto-tls-randomly-generate-t.patch
CVE-2022-30634: 0015-release-branch.go1.17-crypto-rand-properly-handle-la.patch
2022-09-08 20:04:05 +08:00
hubin
e40a694498 backport patch to fix bug of golang plugin mode
Signed-off-by: hubin <hubin73@huawei.com>
2022-09-08 20:03:42 +08:00
hc
9ab15eb485 update golang.spec. 2022-09-08 20:03:32 +08:00
hanchao
6f993c149e fix CVE-2021-44717
Conflict: NA
Score: 4.8
Reference: https://go-review.googlesource.com/c/go/+/370534
Reason: fix CVE-2021-44717

Signed-off-by: hanchao <hanchao47@huawei.com>
2022-09-08 20:03:10 +08:00
hanchao
1145718521 fix CVE-2022-28327,CVE-2022-24675
Conflict: NA
Score: CVE-2022-28327:7.5,CVE-2022-24675:7.5
Reference: https://go-review.googlesource.com/c/go/+/397136,https://go-review.googlesource.com/c/go/+/399816
Reason: CVE-2022-28327,CVE-2022-24675
2022-09-08 20:02:50 +08:00
JackChan8
da8a16d28d golang: upgrade to 1.17.3
Signed-off-by: JackChan8 <chenjiankun1@huawei.com>
Signed-off-by: jingxiaolu <lujingxiao@huawei.com>
2021-12-15 10:28:39 +08:00
DCCooper
0953db6ef4 golang: speed up build progress
Signed-off-by: DCCooper <1866858@gmail.com>
2021-04-15 15:40:15 +08:00
meilier
10a96e3391 golang: upgrade to 1.15.7 2021-01-28 20:44:14 +08:00
yangyanchao
d4285b29c9 all:add cgo support to the riscv port
Signed-off-by: yangyanchao <yangyanchao6@huawei.com>
2020-12-07 15:06:43 +08:00
whoisxxx
09c818ff0c Fix error in changelog date 2020-11-28 13:22:42 +08:00
whoisxxx
42186258f0 Adapt for riscv-64 2020-11-28 13:20:11 +08:00
zvier
17b4faefc5 golang: upgrade to 1.15.5
Signed-off-by: liuzekun <liuzekun@huawei.com>
2020-11-18 10:16:36 +08:00
xiadanni
6ad438669a golang: upgrade to 1.13.15
Signed-off-by: xiadanni <xiadanni1@huawei.com>
2020-08-18 19:23:22 +08:00
xiadanni
5820a98415 golang: add yaml
Signed-off-by: xiadanni <xiadanni1@huawei.com>
2020-07-31 11:24:52 +08:00
xiadanni
52c05d8eb6 golang: upgrade to 1.13.14
Signed-off-by: xiadanni <xiadanni1@huawei.com>
2020-07-31 09:27:27 +08:00
xiadanni
e6fdab00b8 golang: bump to 1.13.4
Signed-off-by: xiadanni <xiadanni1@huawei.com>
2020-07-23 19:40:56 +08:00
DCCooper
deb13bfa9d golang: sync code with CVE and cleancode
reason: 1. drop hard code cert
        2. rename tar name and make it same with upstream

Signed-off-by: DCCooper <1866858@gmail.com>
2020-05-12 17:08:40 +08:00
jingrui
d9ea2f312b golang: fix cve CVE-2020-7919
Change-Id: I0c69fd3added6f82599c1cb9e4a1dbb02112de84
Signed-off-by: jingrui <jingrui@huawei.com>
2020-04-16 16:22:51 +08:00
Grooooot
03aa981a87 golang: remove unused requires "mercurial"
Signed-off-by: Grooooot <isula@huawei.com>
2020-02-20 18:22:53 +08:00
Grooooot
1ce9a9033f golang: fix patch 0012 format
Signed-off-by: Grooooot <isula@huawei.com>
2020-01-10 10:06:14 +08:00
Grooooot
8b0d150421 runtime: use innermost frame's func name for async preemption check
We don't asynchronously preempt if we are in the runtime. We do
this by checking the function name. However, it failed to take
inlining into account. If a runtime function gets inlined into
a non-runtime function, it can be preempted, and bad things can
happen. One instance of this is dounlockOSThread inlined into
UnlockOSThread which is in turn inlined into a non-runtime
function.

Fix this by using the innermost frame's function name.

Change-Id: Ifa036ce1320700aaaefd829b4bee0d04d05c395d
Reviewed-on: https://go-review.googlesource.com/c/go/+/211978
Run-TryBot: Cherry Zhang <cherryyz@google.com>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Austin Clements <austin@google.com>
Signed-off-by: Grooooot <isula@huawei.com>
2020-01-08 15:04:53 +08:00
Grooooot
592bf09553 golang: modification of spec
Signed-off-by: Grooooot <isula@huawei.com>
2020-01-06 10:24:02 +08:00
openeuler-iSula
747b3d9598 golang: modify source0 download address
Signed-off-by: openeuler-iSula <isula@huawei.com>
2019-12-29 15:43:54 +08:00
dogsheng
ce820709f2 Package init 2019-12-25 15:47:08 +08:00
dogsheng
f6abdd32e1 Package init 2019-12-13 15:19:17 +08:00