summaryrefslogtreecommitdiff
path: root/lang
diff options
context:
space:
mode:
authorbsiegert <bsiegert@pkgsrc.org>2022-04-13 07:36:53 +0000
committerbsiegert <bsiegert@pkgsrc.org>2022-04-13 07:36:53 +0000
commit3c9ac2e4564d43762b4c3438777bed06feb853eb (patch)
tree334e2ebdc84c1350293f45f3308753cba3cbfc30 /lang
parent68920d57fe07e7ceeab87a4d24c4ec1e4270b8c3 (diff)
downloadpkgsrc-3c9ac2e4564d43762b4c3438777bed06feb853eb.tar.gz
go117: update to 1.17.9
This minor release includes three security fixes following the security policy: - encoding/pem: fix stack overflow in Decode A large (more than 5 MB) PEM input can cause a stack overflow in Decode, leading the program to crash. Thanks to Juho Nurminen of Mattermost who reported the error. This is CVE-2022-24675 and https://go.dev/issue/51853. - crypto/elliptic: tolerate all oversized scalars in generic P-256 A crafted scalar input longer than 32 bytes can cause P256().ScalarMult or P256().ScalarBaseMult to panic. Indirect uses through crypto/ecdsa and crypto/tls are unaffected. amd64, arm64, ppc64le, and s390x are unaffected. This was discovered thanks to a Project Wycheproof test vector. This is CVE-2022-28327 and https://go.dev/issue/52075. - crypto/x509: non-compliant certificates can cause a panic in Verify on macOS in Go 1.18 Verifying certificate chains containing certificates which are not compliant with RFC 5280 causes Certificate.Verify to panic on macOS. These chains can be delivered through TLS and can cause a crypto/tls or net/http client to crash. Thanks to Tailscale for doing weird things and finding this. This is CVE-2022-27536 and https://go.dev/issue/51759.
Diffstat (limited to 'lang')
-rw-r--r--lang/go/version.mk4
-rw-r--r--lang/go117/PLIST13
-rw-r--r--lang/go117/distinfo8
3 files changed, 14 insertions, 11 deletions
diff --git a/lang/go/version.mk b/lang/go/version.mk
index 9f0c1b6a756..0c60de7b5b0 100644
--- a/lang/go/version.mk
+++ b/lang/go/version.mk
@@ -1,4 +1,4 @@
-# $NetBSD: version.mk,v 1.144 2022/03/15 20:13:45 bsiegert Exp $
+# $NetBSD: version.mk,v 1.145 2022/04/13 07:36:53 bsiegert Exp $
#
# If bsd.prefs.mk is included before go-package.mk in a package, then this
@@ -7,7 +7,7 @@
.include "go-vars.mk"
GO118_VERSION= 1.18
-GO117_VERSION= 1.17.8
+GO117_VERSION= 1.17.9
GO116_VERSION= 1.16.15
GO110_VERSION= 1.10.8
GO19_VERSION= 1.9.7
diff --git a/lang/go117/PLIST b/lang/go117/PLIST
index 3bf051eb780..f74bad8e719 100644
--- a/lang/go117/PLIST
+++ b/lang/go117/PLIST
@@ -1,6 +1,6 @@
-@comment $NetBSD: PLIST,v 1.7 2022/03/07 08:44:52 bsiegert Exp $
-bin/go${GOVERSSUFFIX}
-bin/gofmt${GOVERSSUFFIX}
+@comment $NetBSD: PLIST,v 1.8 2022/04/13 07:36:53 bsiegert Exp $
+bin/go117
+bin/gofmt117
go117/AUTHORS
go117/CONTRIBUTING.md
go117/CONTRIBUTORS
@@ -295,6 +295,9 @@ go117/misc/cgo/testplugin/testdata/method/plugin.go
go117/misc/cgo/testplugin/testdata/method2/main.go
go117/misc/cgo/testplugin/testdata/method2/p/p.go
go117/misc/cgo/testplugin/testdata/method2/plugin.go
+go117/misc/cgo/testplugin/testdata/method3/main.go
+go117/misc/cgo/testplugin/testdata/method3/p/p.go
+go117/misc/cgo/testplugin/testdata/method3/plugin.go
go117/misc/cgo/testplugin/testdata/plugin1/plugin1.go
go117/misc/cgo/testplugin/testdata/plugin2/plugin2.go
go117/misc/cgo/testplugin/testdata/sub/plugin1/plugin1.go
@@ -783,7 +786,7 @@ go117/pkg/${GO_PLATFORM}/net/url.a
go117/pkg/${GO_PLATFORM}/os.a
go117/pkg/${GO_PLATFORM}/os/exec.a
go117/pkg/${GO_PLATFORM}/os/signal.a
-${PLIST.pty}go117/pkg/${GO_PLATFORM}/os/signal/internal/pty.a
+go117/pkg/${GO_PLATFORM}/os/signal/internal/pty.a
go117/pkg/${GO_PLATFORM}/os/user.a
go117/pkg/${GO_PLATFORM}/path.a
go117/pkg/${GO_PLATFORM}/path/filepath.a
@@ -837,7 +840,7 @@ go117/pkg/${GO_PLATFORM}/vendor/golang.org/x/net/http/httpproxy.a
go117/pkg/${GO_PLATFORM}/vendor/golang.org/x/net/http2/hpack.a
go117/pkg/${GO_PLATFORM}/vendor/golang.org/x/net/idna.a
go117/pkg/${GO_PLATFORM}/vendor/golang.org/x/net/nettest.a
-${PLIST.route}go117/pkg/${GO_PLATFORM}/vendor/golang.org/x/net/route.a
+go117/pkg/${GO_PLATFORM}/vendor/golang.org/x/net/route.a
go117/pkg/${GO_PLATFORM}/vendor/golang.org/x/sys/cpu.a
go117/pkg/${GO_PLATFORM}/vendor/golang.org/x/text/secure/bidirule.a
go117/pkg/${GO_PLATFORM}/vendor/golang.org/x/text/transform.a
diff --git a/lang/go117/distinfo b/lang/go117/distinfo
index 08b6914ca11..4c2b0a26006 100644
--- a/lang/go117/distinfo
+++ b/lang/go117/distinfo
@@ -1,8 +1,8 @@
-$NetBSD: distinfo,v 1.14 2022/03/07 08:44:52 bsiegert Exp $
+$NetBSD: distinfo,v 1.15 2022/04/13 07:36:53 bsiegert Exp $
-BLAKE2s (go1.17.8.src.tar.gz) = c974cde147bb2bd4e149b6d06f253be12ae6e4838170957c0a17c94cedaf6830
-SHA512 (go1.17.8.src.tar.gz) = 21d5c51ce62bc3b987dd5bf7c6b7e1a934fe40582bfbbe99ca80c26d41253e796a4b9d02c571f1e5ab3fd7c3950175e23b9929b0d934f421c96a6d6128c44668
-Size (go1.17.8.src.tar.gz) = 22199282 bytes
+BLAKE2s (go1.17.9.src.tar.gz) = e5c413e7ce5ed7521af79b7e46f86d727bc4b8230dae3ad4c3e9cf436e2f5a7c
+SHA512 (go1.17.9.src.tar.gz) = 70c7a6b43531c445cce13963644cc766e5d167597452a1324eacb2ee95bdd9c860ef62f13261bfc4c6baae5773f8953ce6cda9fae21eb7ac0e90bae1ca044a02
+Size (go1.17.9.src.tar.gz) = 22200358 bytes
SHA1 (patch-misc_ios_clangwrap.sh) = 0a06403609cb7bce2e6f65444fd322f486761afe
SHA1 (patch-src_cmd_dist_util.go) = 2d9c2f59e27672d56f5f1a0e3f9d5101a05546a7
SHA1 (patch-src_crypto_x509_root__bsd.go) = 27636e0d8c121ccec6c46a3a82cd0e0469473a6e