summaryrefslogtreecommitdiff
path: root/www/gitea
diff options
context:
space:
mode:
authorbsiegert <bsiegert@pkgsrc.org>2021-01-23 14:07:37 +0000
committerbsiegert <bsiegert@pkgsrc.org>2021-01-23 14:07:37 +0000
commite23f3e16b7c7523627b2e902736445138a6d3c4c (patch)
tree5a2d288df042759d1a801c3291acce731c8a78d7 /www/gitea
parent6a1b8bd0c7a0fe74ebc9e6e569e2fc54e6fe9090 (diff)
downloadpkgsrc-e23f3e16b7c7523627b2e902736445138a6d3c4c.tar.gz
Update go115 to 1.15.7.
* cmd/go: packages using cgo can cause arbitrary code execution at build time The go command may execute arbitrary code at build time when cgo is in use on Windows. This may occur when running “go get”, or any other command that builds code. Only users who build untrusted code (and don’t execute it) are affected. In addition to Windows users, this can also affect Unix users who have “.” listed explicitly in their PATH and are running “go get” or build commands outside of a module or with module mode disabled. Thanks to RyotaK (https://twitter.com/ryotkak) for reporting this issue. This issue is CVE-2021-3115 and Go issue golang.org/issue/43783. For more background on the cmd/go change and help deciding whether your own programs might have similar issues, see our blog post at https://blog.golang.org/path-security. * crypto/elliptic: incorrect operations on the P-224 curve The P224() Curve implementation can in rare circumstances generate incorrect outputs, including returning invalid points from ScalarMult. The crypto/x509 and golang.org/x/crypto/ocsp (but not crypto/tls) packages support P-224 ECDSA keys, but they are not supported by publicly trusted certificate authorities. No other standard library or golang.org/x/crypto package supports or uses the P-224 curve. The incorrect output was found by the elliptic-curve-differential-fuzzer project running on OSS-Fuzz and reported by Philippe Antoine (Catena cyber). This issue is CVE-2021-3114 and Go issue golang.org/issue/43786.
Diffstat (limited to 'www/gitea')
0 files changed, 0 insertions, 0 deletions