File go1.15.changes of Package go1.15.17902

Tue Jan 19 23:21:26 UTC 2021 - Jeff Kowalczyk <>

- go1.15.7 (released 2021-01-19) includes security fixes to the
  cmd/go and crypto/elliptic packages.
  CVE-2021-3114 CVE-2021-3115
  Refs boo#1175132 go1.15 release tracking
  * boo#1181145 CVE-2021-3114
  * go#43788 crypto/elliptic: incorrect operations on the P-224 curve
  * boo#1181146 CVE-2021-3115
  * go#43785 cmd/go: packages using cgo can cause arbitrary code execution on Windows

Thu Dec  3 22:31:19 UTC 2020 - Jeff Kowalczyk <>

- go1.15.6 (released 2020-12-03) includes fixes to the compiler,
  linker, runtime, the go command, and the io package.
  Refs boo#1175132 go1.15 release tracking
  * go#42948 cmd/link: unexpected bindingNone in '_go.buildid'
  * go#42753 cmd/compile: ICE due to bad ORL constant
  * go#42636 runtime: infinite loop in lockextra on linux/amd64
  * go#42567 cmd/go: allow flags in CGO_LDFLAGS environment variable not in security allowlist
  * go#42550 io: Copy leaves file zero bytes in Azure AKS with CIFS - Go1.15 regression
  * go#42521 cmd/link: debug_line can contain multiple entries for the same PC address in Go 1.15.4
  * go#42369 internal/poll: CopyFileRange returns EIO on CentOS 7 ( Linux Kernel 3.10.0-1127) when io.Copy in mounted CIFS

Thu Nov 12 21:10:05 UTC 2020 - Jeff Kowalczyk <>

- go1.15.5 (released 2020-11-12) includes security fixes to the
  cmd/go and math/big packages.
  CVE-2020-28362 CVE-2020-28367 CVE-2020-28366
  Refs boo#1175132 go1.15 release tracking
  * boo#1178750 CVE-2020-28362
  * go#42554 math/big: panic during recursive division of very large numbers
  * boo#1178752 CVE-2020-28367
  * go#42562 cmd/go: arbitrary code can be injected into cgo generated files
  * boo#1178753 CVE-2020-28366
  * go#42558 cmd/go: improper validation of cgo flags can lead to remote code execution at build time

Fri Nov  6 14:50:07 UTC 2020 - Jeff Kowalczyk <>

- go1.15.4 (released 2020-11-05) includes fixes to cgo, the
  compiler, linker, runtime, and the compress/flate, net/http,
  reflect, and time packages.
  Refs boo#1175132 go1.15 release tracking
  * go#42169 cmd/compile, runtime, reflect: pointers to go:notinheap types must be stored indirectly in interfaces
  * go#42151 cmd/cgo: opaque struct pointers are broken since Go 1.15.3
  * go#42138 time: Location interprets wrong timezone (DST) with slim zoneinfo
  * go#42113 x/net/http2: the first write error on a connection will cause all subsequent write requests to fail blindly
  * go#41914 net/http: request.Clone doesn't deep copy TransferEncoding
  * go#41704 runtime: macOS syscall.Exec can get SIGILL due to preemption signal
  * go#41463 compress/flate: deflatefast produces corrupted output
  * go#41387 x/net/http2: connection-level flow control not returned if stream errors, causes server hang
  * go#40974 cmd/link: sectionForAddress(0xA9D67F) address not in any section file

Thu Oct 15 02:42:36 UTC 2020 - Jeff Kowalczyk <>

- go1.15.3 (released 2020-10-14) includes fixes to cgo, the
  compiler, runtime, the go command, and the bytes, plugin, and
  testing packages.
  Refs boo#1175132 go1.15 release tracking
  * go#41871 cmd/cgo: support other GOARCH values in 1.15
  * go#41797 runtime: memory corruption from stack-allocated defer on 32-bit
  * go#41720 cmd/compile: invalid instruction: MOVL $11553462026240, AX
  * go#41620 memory corruption on linux/386 with float32 arithmetic, GO386=387, buildmode pie/c-archive
  * go#41595 internal/bytealg: SIGILL on s390x [1.15 backport] CherryPickApproved
  * go#41543 cmd/compile: 1.15 heap allocations regression when calling Write on os.Stdout
  * go#41464 cmd/go: breakage with go version command and GOFLAGS environment variable
  * go#41453 cmd/addr2line: TestAddr2Line fails with double / in $GOROOT_FINAL
  * go#41432 cmd/cgo: jmethodID/jfieldID is not mapped to uintptr if building with the Android NDK
  * go#41317 runtime: "fatal error: unexpected signal during runtime execution" on windows-amd64-longtest builder of Go 1.15.2 commit
  * go#40881 testing: summary and test output interleaved
  * go#40742 runtime: pcdata is -2 and 12 locals stack map entries error on nil pointer
  * go#40693 plugin: program on linux/s390x sometimes hangs after calling "plugin.Open"
  * go#40643 runtime: race between stack shrinking and channel send/recv leads to bad sudog values

Thu Sep 09 22:51:08 UTC 2020 - Jeff Kowalczyk <>

- go1.15.2 (released 2020-09-09) includes fixes to the compiler,
  runtime, documentation, the go command, and the net/mail, os,
  sync, and testing packages.
  Refs boo#1175132 go1.15 release tracking
  * go#41193 net/http/fcgi: race detected during execution of TestResponseWriterSniffsContentType test
  * go#41178 doc: include fix for #34437 in Go 1.14 release notes
  * go#41034 testing: Cleanup races with Logf and Errorf
  * go#41011 sync: sync.Map keys will never be garbage collected
  * go#40934 runtime: checkptr incorrectly -race flagging when using &^ arithmetic
  * go#40900 internal/poll: CopyFileRange returns EPERM on CircleCI Docker Host running 4.10.0-40-generic
  * go#40868 cmd/compile: R12 can be clobbered for write barrier call on PPC64
  * go#40849 testing: "=== PAUSE" lines do not change the test name for the next log line
  * go#40845 runtime: Panic if newstack at runtime.acquireLockRank
  * go#40805 cmd/test2json: tests that panic are marked as passing
  * go#40804 net/mail: change in behavior of ParseAddressList("") in 1.15
  * go#40802 cmd/go: in 1.15: change in "go test" argument parsing
  * go#40798 cmd/compile: inline marker targets not reachable after assembly on arm
  * go#40772 cmd/compile: compiler crashes in ssa: isNonNegative bad type
  * go#40767 cmd/compile: inline marker targets not reachable after assembly on ppc64x
  * go#40739 internal/poll: CopyFileRange returns ENOTSUP on Linux 3.10.0 kernel on NFS mount
  * go#40412 runtime: Windows service lifecycle events behave incorrectly when called within a golang environment
- Add missing '?' before 'suse_version' test by Xia Lei <>

Fri Sep  4 14:51:12 UTC 2020 - Marcus Meissner <>

- replace binutils-gold requires by recommends for aarch64 on SLE. (bsc#1170826)

Tue Sep  1 17:01:46 UTC 2020 - Jeff Kowalczyk <>

- go1.15.1 (released 2020-09-01) includes security fixes to the
  net/http/cgi and net/http/fcgi packages.
  Refs boo#1175132 go1.15 release tracking
  * boo#1176031 CVE-2020-24553
  * go#41165 net/http/cgi,net/http/fcgi: Cross-Site Scripting (XSS) when Content-Type is not specified

Wed Aug 11 23:53:56 UTC 2020 - Jeff Kowalczyk <>

- go1.15 (released 2020-08-11) Go 1.15 is a major release of Go.
  go1.15.x minor releases will be provided through August 2021.
  Most changes are in the implementation of the toolchain, runtime,
  and libraries. As always, the release maintains the Go 1 promise
  of compatibility. We expect almost all Go programs to continue to
  compile and run as before.
  Refs boo#1175132 go1.15 release tracking
  * See release notes Excerpts
    relevant to OBS environment and for SUSE/openSUSE follow:
  * Module support in the go command is ready for production use,
    and we encourage all users to migrate to Go modules for
    dependency management.
  * Module cache: The location of the module cache may now be set
    with the GOMODCACHE environment variable. The default value of
    GOMODCACHE is GOPATH[0]/pkg/mod, the location of the module
    cache before this change.
  * Compiler flag parsing: Various flag parsing issues in go test
    and go vet have been fixed. Notably, flags specified in
    GOFLAGS are handled more consistently, and the -outputdir flag
    now interprets relative paths relative to the working
    directory of the go command (rather than the working directory
    of each individual test).
  * The GOPROXY environment variable now supports skipping proxies
    that return errors. Proxy URLs may now be separated with
    either commas (,) or pipe characters (|). If a proxy URL is
    followed by a comma, the go command will only try the next
    proxy in the list after a 404 or 410 HTTP response. If a proxy
    URL is followed by a pipe character, the go command will try
    the next proxy in the list after any error. Note that the
    default value of GOPROXY remains,direct, which does not fall back to
    direct in case of errors.
  * On a Unix system, if the kill command or kill system call is
    used to send a SIGSEGV, SIGBUS, or SIGFPE signal to a Go
    program, and if the signal is not being handled via
    os/signal.Notify, the Go program will now reliably crash with
    a stack trace. In earlier releases the behavior was
  * Allocation of small objects now performs much better at high
    core counts, and has lower worst-case latency.
  * Go 1.15 reduces typical binary sizes by around 5% compared to
    Go 1.14 by eliminating certain types of GC metadata and more
    aggressively eliminating unused type metadata.
  * The toolchain now mitigates Intel CPU erratum SKX102 on
    GOARCH=amd64 by aligning functions to 32 byte boundaries and
    padding jump instructions. While this padding increases binary
    sizes, this is more than made up for by the binary size
    improvements mentioned above.
  * Go 1.15 adds a -spectre flag to both the compiler and the
    assembler, to allow enabling Spectre mitigations. These should
    almost never be needed and are provided mainly as a "defense
    in depth" mechanism. See the Spectre Go wiki page for details.
  * The compiler now rejects //go: compiler directives that have
    no meaning for the declaration they are applied to with a
    "misplaced compiler directive" error. Such misapplied
    directives were broken before, but were silently ignored by
    the compiler.
  * Substantial improvements to the Go linker, which reduce linker
    resource usage (both time and memory) and improve code
    robustness/maintainability. Linking is 20% faster and requires
    30% less memory on average. These changes are part of a
    multi-release project to modernize the Go linker, meaning that
    there will be additional linker improvements expected in
    future releases.
  * The linker now defaults to internal linking mode for
    -buildmode=pie on linux/amd64 and linux/arm64, so these
    configurations no longer require a C linker.
  * There has been progress in improving the stability and
    performance of the 64-bit RISC-V port on Linux (GOOS=linux,
    GOARCH=riscv64). It also now supports asynchronous preemption.
  * crypto/x509: The deprecated, legacy behavior of treating the
    CommonName field on X.509 certificates as a host name when no
    Subject Alternative Names are present is now disabled by
    default. It can be temporarily re-enabled by adding the value
    x509ignoreCN=0 to the GODEBUG environment variable. Note that
    if the CommonName is an invalid host name, it's always
    ignored, regardless of GODEBUG settings. Invalid names include
    those with any characters other than letters, digits, hyphens
    and underscores, and those with empty labels or trailing dots.
  * crypto/x509: go1.15 applications with an AWS DB instance that
    was created or updated to the rds-ca-2019 certificate prior to
    July 28, 2020, you must update the certificate again. If you
    created your DB instance or updated its certificate after July
    28, 2020, no action is required. For more information, see

Fri Aug  7 23:30:11 UTC 2020 - Jeff Kowalczyk <>

- go1.15rc2 (released 2020-08-07) is a release candidate of go1.15
  cut from the master branch at the revision tagged go1.15rc2.

Fri Jul 24 21:15:52 UTC 2020 - Jeff Kowalczyk <>

- go1.15rc1 (released 2020-07-24) is a release candidate of go1.15
  cut from the master branch at the revision tagged go1.15rc1.

Fri Jun 12 16:21:05 UTC 2020 - Jeff Kowalczyk <>

- go1.15beta1 (released 2020-06-11) is a beta version of go1.15 cut
  from the master branch at the revision tagged go1.15beta1.
openSUSE Build Service is sponsored by