<feed xmlns='http://www.w3.org/2005/Atom'>
<title>go, branch go1.12.17</title>
<subtitle>Fork of Go programming language with my patches.</subtitle>
<id>http://git.kilabit.info/go/atom?h=go1.12.17</id>
<link rel='self' href='http://git.kilabit.info/go/atom?h=go1.12.17'/>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/'/>
<updated>2020-02-12T19:55:29Z</updated>
<entry>
<title>[release-branch.go1.12] go1.12.17</title>
<updated>2020-02-12T19:55:29Z</updated>
<author>
<name>Alexander Rakoczy</name>
<email>alex@golang.org</email>
</author>
<published>2020-02-12T17:56:44Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=46cb016190389b7e37b21f04e5343a628ca1f662'/>
<id>urn:sha1:46cb016190389b7e37b21f04e5343a628ca1f662</id>
<content type='text'>
Change-Id: I9d398ed495011487544b1e5d0a469ae73c6f5927
Reviewed-on: https://go-review.googlesource.com/c/go/+/219218
Run-TryBot: Alexander Rakoczy &lt;alex@golang.org&gt;
TryBot-Result: Gobot Gobot &lt;gobot@golang.org&gt;
Reviewed-by: Carlos Amedee &lt;carlos@golang.org&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.12] doc: document Go 1.12.17</title>
<updated>2020-02-12T17:52:48Z</updated>
<author>
<name>Alexander Rakoczy</name>
<email>alex@golang.org</email>
</author>
<published>2020-02-12T16:32:58Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=b293f01b4ae5d480c199d8126a26b88e6f997236'/>
<id>urn:sha1:b293f01b4ae5d480c199d8126a26b88e6f997236</id>
<content type='text'>
Change-Id: I95f81f269e742ac058cb3e6404cc43beb2428926
Reviewed-on: https://go-review.googlesource.com/c/go/+/219200
Run-TryBot: Alexander Rakoczy &lt;alex@golang.org&gt;
TryBot-Result: Gobot Gobot &lt;gobot@golang.org&gt;
Reviewed-by: Carlos Amedee &lt;carlos@golang.org&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.12] all: merge release-branch.go1.12-security into release-branch.go1.12</title>
<updated>2020-01-31T00:14:28Z</updated>
<author>
<name>Dmitri Shuralyov</name>
<email>dmitshur@golang.org</email>
</author>
<published>2020-01-31T00:14:03Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=249c282caf075fda88658ef6e11fb90067f238b0'/>
<id>urn:sha1:249c282caf075fda88658ef6e11fb90067f238b0</id>
<content type='text'>
Change-Id: Ic8ed07ad2c77042a67d7e1d4e9c0d5953610cf07
</content>
</entry>
<entry>
<title>[release-branch.go1.12-security] go1.12.16</title>
<updated>2020-01-27T22:27:19Z</updated>
<author>
<name>Dmitri Shuralyov</name>
<email>dmitshur@golang.org</email>
</author>
<published>2020-01-27T21:36:40Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=deac3221fc4cd365fb40d269dd56551e9d354356'/>
<id>urn:sha1:deac3221fc4cd365fb40d269dd56551e9d354356</id>
<content type='text'>
Change-Id: Iea658e285670a897a45eca3756004f050763c64d
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/649301
Reviewed-by: Katie Hockman &lt;katiehockman@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.12-security] doc: document Go 1.12.16</title>
<updated>2020-01-27T21:15:08Z</updated>
<author>
<name>Katie Hockman</name>
<email>katie@golang.org</email>
</author>
<published>2020-01-27T19:11:04Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=e60fc07b54375c9dcc5d6e28c9376926c450fd57'/>
<id>urn:sha1:e60fc07b54375c9dcc5d6e28c9376926c450fd57</id>
<content type='text'>
Change-Id: Ib8ac9bf5020d9ab126a8069378978d7dce3509dc
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/648870
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.12-security] internal/x/crypto/cryptobyte: import security fix for 32-bit archs</title>
<updated>2020-01-27T20:31:21Z</updated>
<author>
<name>Katie Hockman</name>
<email>katie@golang.org</email>
</author>
<published>2020-01-24T20:29:12Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=44bb3b4b5341f5bb373acb0b8130795f888c9ace'/>
<id>urn:sha1:44bb3b4b5341f5bb373acb0b8130795f888c9ace</id>
<content type='text'>
    cryptobyte: fix panic due to malformed ASN.1 inputs on 32-bit archs

    When int is 32 bits wide (on 32-bit architectures like 386 and arm), an
    overflow could occur, causing a panic, due to malformed ASN.1 being
    passed to any of the ASN1 methods of String.

    Tested on linux/386 and darwin/amd64.

    This fixes CVE-2020-7919 and was found thanks to the Project Wycheproof
    test vectors.

    Change-Id: I8c9696a8bfad1b40ec877cd740dba3467d66ab54
    Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/645211
    Reviewed-by: Katie Hockman &lt;katiehockman@google.com&gt;
    Reviewed-by: Adam Langley &lt;agl@google.com&gt;

x/crypto/cryptobyte is used in crypto/x509 for parsing certificates.
Malformed certificates might cause a panic during parsing on 32-bit
architectures (like arm and 386).

Change-Id: I3c619af508bacff84023be4d5a7c4992c2f20a56
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/647483
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.12-security] crypto/x509: mitigate CVE-2020-0601 verification bypass on Windows</title>
<updated>2020-01-24T19:25:49Z</updated>
<author>
<name>Filippo Valsorda</name>
<email>filippo@golang.org</email>
</author>
<published>2020-01-21T19:45:15Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=a8b372fb365f4b69f0b06aa9c3e642e6aa022840'/>
<id>urn:sha1:a8b372fb365f4b69f0b06aa9c3e642e6aa022840</id>
<content type='text'>
An attacker can trick the Windows system verifier to use a poisoned set
of elliptic curve parameters for a trusted root, allowing it to generate
spoofed signatures. When this happens, the returned chain will present
the unmodified original root, so the actual signatures won't verify (as
they are invalid for the correct parameters). Simply double check them
as a safety measure and mitigation.

Windows users should still install the system security patch ASAP.

This is the same mitigation adopted by Chromium:

https://chromium-review.googlesource.com/c/chromium/src/+/1994434

Change-Id: I2c734f6fb2cb51d906c7fd77034318ffeeb3e146
Reviewed-on: https://go-review.googlesource.com/c/go/+/215905
Run-TryBot: Filippo Valsorda &lt;filippo@golang.org&gt;
TryBot-Result: Gobot Gobot &lt;gobot@golang.org&gt;
Reviewed-by: Ryan Sleevi &lt;sleevi@google.com&gt;
Reviewed-by: Katie Hockman &lt;katie@golang.org&gt;
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/647124
Reviewed-by: Filippo Valsorda &lt;valsorda@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.12] runtime: ignore power notification error seen on Windows Docker</title>
<updated>2020-01-16T19:05:18Z</updated>
<author>
<name>Ian Lance Taylor</name>
<email>iant@golang.org</email>
</author>
<published>2020-01-15T14:38:16Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=4af1337d1e9eb9e7b766c9deb787c78413bb25c4'/>
<id>urn:sha1:4af1337d1e9eb9e7b766c9deb787c78413bb25c4</id>
<content type='text'>
Updates #36557
Fixes #36574

Change-Id: Ia8125f382d5e14e5612da811268a58971cc9ac08
Reviewed-on: https://go-review.googlesource.com/c/go/+/214917
Run-TryBot: Ian Lance Taylor &lt;iant@golang.org&gt;
TryBot-Result: Gobot Gobot &lt;gobot@golang.org&gt;
Reviewed-by: Brad Fitzpatrick &lt;bradfitz@golang.org&gt;
Reviewed-by: Jason A. Donenfeld &lt;Jason@zx2c4.com&gt;
Reviewed-by: Austin Clements &lt;austin@google.com&gt;
(cherry picked from commit d2de9bd59c068c1bfcb4293de4286196dacf2e43)
Reviewed-on: https://go-review.googlesource.com/c/go/+/215017
</content>
</entry>
<entry>
<title>[release-branch.go1.12] cmd/go/internal/modload: remove erroneous test case</title>
<updated>2020-01-10T21:56:50Z</updated>
<author>
<name>Bryan C. Mills</name>
<email>bcmills@google.com</email>
</author>
<published>2020-01-10T14:25:51Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=9720aff0bcf876647cf064a4e92eeab43598bfc5'/>
<id>urn:sha1:9720aff0bcf876647cf064a4e92eeab43598bfc5</id>
<content type='text'>
Commit e0cf3de987e6 of the vcs-test.golang.org/git/querytest repo
includes a go.mod file specifying path vcs-test.golang.org/git/querytest.git,
as does the latest commit. Since the repository also lacks v3 tags,
a query for "latest" with a v3 path should fail.

Due to a bug, that query does not fail as expected with Go 1.12.
However, we do not need to continue to test for buggy behavior that
was fixed in a subsequent release.

Updates #36489

Change-Id: I766390c962fc75ba98fad02831310d90abf3055f
Reviewed-on: https://go-review.googlesource.com/c/go/+/214281
Run-TryBot: Bryan C. Mills &lt;bcmills@google.com&gt;
TryBot-Result: Gobot Gobot &lt;gobot@golang.org&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.12] go1.12.15</title>
<updated>2020-01-09T19:00:28Z</updated>
<author>
<name>Carlos Amedee</name>
<email>carlos@golang.org</email>
</author>
<published>2020-01-09T16:24:31Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=694e20f4e08af7e7669c9652424d0df9b0b83f00'/>
<id>urn:sha1:694e20f4e08af7e7669c9652424d0df9b0b83f00</id>
<content type='text'>
Change-Id: I6e47da51c3687ae9590554d003d803270f50911e
Reviewed-on: https://go-review.googlesource.com/c/go/+/214082
Run-TryBot: Carlos Amedee &lt;carlos@golang.org&gt;
TryBot-Result: Gobot Gobot &lt;gobot@golang.org&gt;
Reviewed-by: Alexander Rakoczy &lt;alex@golang.org&gt;
</content>
</entry>
</feed>
