File _patchinfo of Package patchinfo.29085
<patchinfo incident="29085">
<issue tracker="jsc" id="PED-1962"/>
<issue tracker="bnc" id="1201440">VUL-0: CVE-2022-30633: go1.17,go1.18: encoding/xml: stack exhaustion in Unmarshal</issue>
<issue tracker="bnc" id="1208271">VUL-0: TRACKERBUG: CVE-2022-41724: go1.19,go1.20: crypto/tls: large handshake records may cause panics</issue>
<issue tracker="bnc" id="1208491">PTF request for go1.{18,19} for CVE-2022-4172{3-5} [ref:_00D1igLOd._5005qM0AP4:ref]</issue>
<issue tracker="bnc" id="1200135">VUL-0: CVE-2022-30629: go1.17,go1.18: crypto/tls: session tickets lack random ticket_age_add</issue>
<issue tracker="bnc" id="1200137">VUL-0: CVE-2022-29804: go1.17,go1.18: path/filepath: Clean(`.\c:`) returns `c:` on Windows</issue>
<issue tracker="bnc" id="1201448">VUL-0: CVE-2022-1962: go1.17,go1.18: go/parser: stack exhaustion in all Parse* functions</issue>
<issue tracker="bnc" id="1198424">VUL-0: CVE-2022-28327: go1.17,go1.18: crypto/elliptic: tolerate all oversized scalars in generic P-256</issue>
<issue tracker="bnc" id="1200136">VUL-0: CVE-2022-30580: go1.17,go1.18: os/exec: empty Cmd.Path can result in running unintended binary on Windows</issue>
<issue tracker="bnc" id="1206135">VUL-0: CVE-2022-41717: go1.18,go1.19: net/http: limit canonical header cache by bytes, not entries</issue>
<issue tracker="bnc" id="1183043">go compilers need binutils-gold on aarch64 (and armv7)</issue>
<issue tracker="bnc" id="1204941">VUL-0: CVE-2022-41716: go1.18,go1.19: syscall, os/exec: unsanitized NUL in environment variables</issue>
<issue tracker="bnc" id="1206134">VUL-0: CVE-2022-41720: go1.18,go1.19: os, net/http: avoid escapes from os.DirFS and http.Dir on Windows</issue>
<issue tracker="bnc" id="1201447">VUL-0: CVE-2022-30630: go1.17,go1.18: io/fs: stack exhaustion in Glob</issue>
<issue tracker="bnc" id="1208272">VUL-0: TRACKERBUG: CVE-2022-41725: go1.19,go1.20: net/http, mime/multipart: denial of service from excessive resource consumption</issue>
<issue tracker="bnc" id="1203185">VUL-0: CVE-2022-27664: go1.18,go1.19: net/http: handle server errors after sending GOAWAY</issue>
<issue tracker="bnc" id="1204024">VUL-0: CVE-2022-2879: go1.18,go1.19: archive/tar: unbounded memory consumption when reading headers</issue>
<issue tracker="bnc" id="1204023">VUL-0: CVE-2022-41715: go1.18,go1.19: regexp/syntax: limit memory used by parsing regexps</issue>
<issue tracker="bnc" id="1201445">VUL-0: CVE-2022-30632: go1.17,go1.18: path/filepath: stack exhaustion in Glob</issue>
<issue tracker="bnc" id="1200134">VUL-0: CVE-2022-30634: go1.17,go1.18: crypto/rand: rand.Read hangs with extremely large buffers</issue>
<issue tracker="bnc" id="1198427">VUL-0: CVE-2022-27536: go1.17,go1.18: crypto/x509: Certificate.Verify crash on macOS with Go 1.18</issue>
<issue tracker="bnc" id="1208270">VUL-0: TRACKERBUG: CVE-2022-41723: go1.19,go1.20: net/http: avoid quadratic complexity in HPACK decoding</issue>
<issue tracker="bnc" id="1201444">VUL-0: CVE-2022-30635: go1.17,go1.18: encoding/gob: stack exhaustion in Decoder.Decode</issue>
<issue tracker="bnc" id="1201434">VUL-0: CVE-2022-1705: go1.17,go1.18: net/http: improper sanitization of Transfer-Encoding header</issue>
<issue tracker="bnc" id="1202035">VUL-0: CVE-2022-32189: go1.17,go1.18: encoding/gob and math/big: decoding big.Float and big.Rat can panic</issue>
<issue tracker="bnc" id="1201443">VUL-0: CVE-2022-28131: go1.17,go1.18: encoding/xml: stack exhaustion in Decoder.Skip</issue>
<issue tracker="bnc" id="1201436">VUL-0: CVE-2022-32148: go1.17,go1.18: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working</issue>
<issue tracker="bnc" id="1198423">VUL-0: CVE-2022-24675: go1.17,go1.18: encoding/pem: stack overflow</issue>
<issue tracker="bnc" id="1204025">VUL-0: CVE-2022-2880: go1.18,go1.19: net/http/httputil: ReverseProxy should not forward unparseable query parameters</issue>
<issue tracker="bnc" id="1199413">VUL-0: CVE-2022-29526: go1.17,go1.18: syscall: Faccessat checks wrong group</issue>
<issue tracker="bnc" id="1201437">VUL-0: CVE-2022-30631: go1.17,go1.18: compress/gzip stack exhaustion in Reader.Read</issue>
<issue tracker="bnc" id="1193742">go1.18 release tracking</issue>
<issue tracker="cve" id="2022-41720"/>
<issue tracker="cve" id="2022-30635"/>
<issue tracker="cve" id="2022-30580"/>
<issue tracker="cve" id="2022-27536"/>
<issue tracker="cve" id="2022-2879"/>
<issue tracker="cve" id="2022-1705"/>
<issue tracker="cve" id="2022-24675"/>
<issue tracker="cve" id="2022-41717"/>
<issue tracker="cve" id="2022-41715"/>
<issue tracker="cve" id="2022-32189"/>
<issue tracker="cve" id="2022-30634"/>
<issue tracker="cve" id="2022-30629"/>
<issue tracker="cve" id="2022-29804"/>
<issue tracker="cve" id="2022-32148"/>
<issue tracker="cve" id="2022-28327"/>
<issue tracker="cve" id="2022-27664"/>
<issue tracker="cve" id="2022-41716"/>
<issue tracker="cve" id="2022-41723"/>
<issue tracker="cve" id="2022-30633"/>
<issue tracker="cve" id="2022-2880"/>
<issue tracker="cve" id="2022-1962"/>
<issue tracker="cve" id="2022-41725"/>
<issue tracker="cve" id="2022-30630"/>
<issue tracker="cve" id="2022-30632"/>
<issue tracker="cve" id="2022-41724"/>
<issue tracker="cve" id="2022-29526"/>
<issue tracker="cve" id="2022-30631"/>
<issue tracker="cve" id="2022-28131"/>
<packager>jfkw</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for go1.18-openssl</summary>
<description>This update for go1.18-openssl fixes the following issues:
- Add subpackage go1.x-libstd compiled shared object libstd.so (jsc#PED-1962)
* Main go1.x package included libstd.so in previous versions
* Split libstd.so into subpackage that can be installed standalone
* Continues the slimming down of main go1.x package by 40 Mb
* Experimental and not recommended for general use, Go currently has no ABI
* Upstream Go has not committed to support buildmode=shared long-term
* Do not use in packaging, build static single binaries (the default)
* Upstream Go go1.x binary releases do not include libstd.so
* go1.x Suggests go1.x-libstd so not installed by default Recommends
* go1.x-libstd does not Require: go1.x so can install standalone
* Provides go-libstd unversioned package name
* Fix build step -buildmode=shared std to omit -linkshared
- Packaging improvements:
* go1.x Suggests go1.x-doc so not installed by default Recommends
* Use Group: Development/Languages/Go instead of Other
- Improvements to go1.x packaging spec:
* On Tumbleweed bootstrap with current default gcc13 and gccgo118
* On SLE-12 aarch64 ppc64le ppc64 remove overrides to bootstrap
using go1.x package (%bcond_without gccgo). This is no longer
needed on current SLE-12:Update and removing will consolidate
the build configurations used.
* Change source URLs to go.dev as per Go upstream
* On x86_64 export GOAMD64=v1 as per the current baseline.
At this time forgo GOAMD64=v3 option for x86_64_v3 support.
* On x86_64 %define go_amd64=v1 as current instruction baseline
- Update to version 1.18.10.1 cut from the go1.18-openssl-fips
branch at the revision tagged go1.18.10-1-openssl-fips.
* Merge branch dev.boringcrypto.go1.18 into go1.18-openssl-fips
* Merge go1.18.10 into dev.boringcrypto.go1.18
- go1.18.10 (released 2023-01-10) includes fixes to cgo, the
compiler, the linker, and the crypto/x509, net/http, and syscall
packages.
Refs bsc#1193742 go1.18 release tracking
* go#57705 misc/cgo: backport needed for dlltool fix
* go#57426 crypto/x509: Verify on macOS does not return typed errors
* go#57344 cmd/compile: the loong64 intrinsic for CompareAndSwapUint32 function needs to sign extend its "old" argument.
* go#57338 syscall, internal/poll: accept4-to-accept fallback removal broke Go code on Synology DSM 6.2 ARM devices
* go#57213 os: TestLstat failure on Linux Aarch64
* go#57211 reflect: sort.SliceStable sorts incorrectly on arm64 with less function created with reflect.MakeFunc and slice of sufficient length
* go#57057 cmd/go: remove test dependency on gopkg.in service
* go#57054 cmd/go: TestScript/version_buildvcs_git_gpg (if enabled) fails on linux longtest builders
* go#57044 cgo: malformed DWARF TagVariable entry
* go#57028 cmd/cgo: Wrong types in compiler errors with clang 14
* go#56833 cmd/link/internal/ppc64: too-far trampoline is reused
* go#56711 net: reenable TestLookupDotsWithRemoteSource and TestLookupGoogleSRV with a different target
* go#56323 net/http: bad handling of HEAD requests with a body
</description>
</patchinfo>