<feed xmlns='http://www.w3.org/2005/Atom'>
<title>go, branch go1.15.5</title>
<subtitle>Fork of Go programming language with my patches.</subtitle>
<id>http://git.kilabit.info/go/atom?h=go1.15.5</id>
<link rel='self' href='http://git.kilabit.info/go/atom?h=go1.15.5'/>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/'/>
<updated>2020-11-12T16:39:58Z</updated>
<entry>
<title>[release-branch.go1.15-security] go1.15.5</title>
<updated>2020-11-12T16:39:58Z</updated>
<author>
<name>Carlos Amedee</name>
<email>carlos@golang.org</email>
</author>
<published>2020-11-12T14:43:55Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=c53315d6cf1b4bfea6ff356b4a1524778c683bb9'/>
<id>urn:sha1:c53315d6cf1b4bfea6ff356b4a1524778c683bb9</id>
<content type='text'>
Change-Id: Id3b116c0f54c2131111bc8afacb8d81d06f96461
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/901407
Reviewed-by: Katie Hockman &lt;katiehockman@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.15-security] math/big: fix shift for recursive division</title>
<updated>2020-11-11T23:35:42Z</updated>
<author>
<name>Katie Hockman</name>
<email>katie@golang.org</email>
</author>
<published>2020-11-10T20:54:12Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=84150d0af193a7ccd733b3c7fa5787f43125cd2d'/>
<id>urn:sha1:84150d0af193a7ccd733b3c7fa5787f43125cd2d</id>
<content type='text'>
The previous s value could cause a crash
for certain inputs.

Will check in tests and documentation improvements later.

Thanks to the Go Ethereum team and the OSS-Fuzz project for reporting this.
Thanks to Rémy Oudompheng and Robert Griesemer for their help
developing and validating the fix.

Fixes CVE-2020-28362

Change-Id: Ibbf455c4436bcdb07c84a34fa6551fb3422356d3
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/899974
Reviewed-by: Roland Shoemaker &lt;bracewell@google.com&gt;
Reviewed-by: Filippo Valsorda &lt;valsorda@google.com&gt;
(cherry picked from commit 28015462c2a83239543dc2bef651e9a5f234b633)
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/901065
</content>
</entry>
<entry>
<title>[release-branch.go1.15-security] cmd/go: in cgoflags, permit -DX1, prohibit -Wp,-D,opt</title>
<updated>2020-11-11T23:35:26Z</updated>
<author>
<name>Ian Lance Taylor</name>
<email>iant@golang.org</email>
</author>
<published>2020-11-03T05:31:06Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=ec06b6d6be568ce1591d91a0ea4f14c190d06605'/>
<id>urn:sha1:ec06b6d6be568ce1591d91a0ea4f14c190d06605</id>
<content type='text'>
Restrict -D and -U to ASCII C identifiers, but do permit trailing digits.
When using -Wp, prohibit commas in -D values.

Thanks to Imre Rad (https://www.linkedin.com/in/imre-rad-2358749b) for reporting this.

Fixes CVE-2020-28367

Change-Id: Ibfc4dfdd6e6c258e131448e7682610c44eee9492
Reviewed-on: https://go-review.googlesource.com/c/go/+/267277
Trust: Ian Lance Taylor &lt;iant@golang.org&gt;
Run-TryBot: Ian Lance Taylor &lt;iant@golang.org&gt;
TryBot-Result: Go Bot &lt;gobot@golang.org&gt;
Reviewed-by: Bryan C. Mills &lt;bcmills@google.com&gt;
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/899924
Reviewed-by: Filippo Valsorda &lt;valsorda@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.15-security] cmd/go, cmd/cgo: don't let bogus symbol set cgo_ldflag</title>
<updated>2020-11-11T23:35:14Z</updated>
<author>
<name>Ian Lance Taylor</name>
<email>iant@golang.org</email>
</author>
<published>2020-11-06T17:38:38Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=32159824698a82a174b60a6845e8494ae3243102'/>
<id>urn:sha1:32159824698a82a174b60a6845e8494ae3243102</id>
<content type='text'>
A hand-edited object file can have a symbol name that uses newline and
other normally invalid characters. The cgo tool will generate Go files
containing symbol names, unquoted. That can permit those symbol names
to inject Go code into a cgo-generated file. If that Go code uses the
//go:cgo_ldflag pragma, it can cause the C linker to run arbitrary
code when building a package. If you build an imported package we
permit arbitrary code at run time, but we don't want to permit it at
package build time. This CL prevents this in two ways.

In cgo, reject invalid symbols that contain non-printable or space
characters, or that contain anything that looks like a Go comment.

In the go tool, double check all //go:cgo_ldflag directives in
generated code, to make sure they follow the existing LDFLAG restrictions.

Thanks to Chris Brown and Tempus Ex for reporting this.

Fixes CVE-2020-28366

Change-Id: Ia1ad8f3791ea79612690fa7d26ac451d0f6df7c1
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/895832
Reviewed-by: Than McIntosh &lt;thanm@google.com&gt;
Reviewed-by: Cherry Zhang &lt;cherryyz@google.com&gt;
(cherry picked from commit 6bc814dd2bbfeaafa41d314dd4cc591b575dfbf6)
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/901056
Reviewed-by: Filippo Valsorda &lt;valsorda@google.com&gt;
Reviewed-by: Roland Shoemaker &lt;bracewell@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.15] go1.15.4</title>
<updated>2020-11-05T21:21:32Z</updated>
<author>
<name>Alexander Rakoczy</name>
<email>alex@golang.org</email>
</author>
<published>2020-11-05T18:12:55Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=0e953add9656c32a788e06438cd7b533e968b7f8'/>
<id>urn:sha1:0e953add9656c32a788e06438cd7b533e968b7f8</id>
<content type='text'>
Change-Id: Ibcd61e2c7ef7cc6f8509dadea6c3952c5dd7016e
Reviewed-on: https://go-review.googlesource.com/c/go/+/267879
Run-TryBot: Alexander Rakoczy &lt;alex@golang.org&gt;
TryBot-Result: Go Bot &lt;gobot@golang.org&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
Trust: Alexander Rakoczy &lt;alex@golang.org&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.15] net/http: update bundled x/net/http2</title>
<updated>2020-10-30T15:57:43Z</updated>
<author>
<name>Dmitri Shuralyov</name>
<email>dmitshur@golang.org</email>
</author>
<published>2020-10-29T22:50:31Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=ef3039e99d3413735d863d84347561003d63340e'/>
<id>urn:sha1:ef3039e99d3413735d863d84347561003d63340e</id>
<content type='text'>
Bring in the change in CL 266158 with:

	go mod edit -replace=golang.org/x/net=golang.org/x/net@release-branch.go1.15-bundle
	GOFLAGS='-mod=mod' go generate -run=bundle std
	go mod edit -dropreplace=golang.org/x/net
	go get -d golang.org/x/net@release-branch.go1.15
	go mod tidy
	go mod vendor

Updates #39337.
Fixes #42113.

Change-Id: I3ebef4b90c11ad271b7a3031aafd80c423c2c241
Reviewed-on: https://go-review.googlesource.com/c/go/+/266375
Trust: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
Run-TryBot: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
TryBot-Result: Go Bot &lt;gobot@golang.org&gt;
Reviewed-by: Emmanuel Odeke &lt;emmanuel@orijtech.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.15] time: fix LoadLocationFromTZData with slim tzdata</title>
<updated>2020-10-29T22:30:25Z</updated>
<author>
<name>Christopher Hlubek</name>
<email>christopher.hlubek@networkteam.com</email>
</author>
<published>2020-10-26T12:44:44Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=5b023e693ff8058bcffe7103d7ddd120910af692'/>
<id>urn:sha1:5b023e693ff8058bcffe7103d7ddd120910af692</id>
<content type='text'>
The extend information of a time zone file with last transition &lt; now
could result in a wrong cached zone because it used the zone of the
last transition.

This could lead to wrong zones in systems with slim zoneinfo.

For #42216
Fixes #42138

Change-Id: I7c57c35b5cfa58482ac7925b5d86618c52f5444d
Reviewed-on: https://go-review.googlesource.com/c/go/+/264939
Trust: Tobias Klauser &lt;tobias.klauser@gmail.com&gt;
Run-TryBot: Tobias Klauser &lt;tobias.klauser@gmail.com&gt;
TryBot-Result: Go Bot &lt;gobot@golang.org&gt;
Reviewed-by: Ian Lance Taylor &lt;iant@golang.org&gt;
(cherry picked from commit 70e022e4a83dc996ac4f108e811fbc399ad5565b)
Reviewed-on: https://go-review.googlesource.com/c/go/+/266299
Trust: Ian Lance Taylor &lt;iant@golang.org&gt;
Run-TryBot: Ian Lance Taylor &lt;iant@golang.org&gt;
Reviewed-by: Tobias Klauser &lt;tobias.klauser@gmail.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.15] time: support slim tzdata format</title>
<updated>2020-10-29T19:02:27Z</updated>
<author>
<name>Ian Lance Taylor</name>
<email>iant@golang.org</email>
</author>
<published>2020-10-22T22:25:00Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=414668cfbc41fd8cadf74e981849d1e05cc23b2e'/>
<id>urn:sha1:414668cfbc41fd8cadf74e981849d1e05cc23b2e</id>
<content type='text'>
Backport of part of https://golang.org/cl/261877 to support the slim
tzdata format. As of tzdata 2020b, the default is to use the slim format.
We need to support that format so that Go installations continue to
work when tzdata is updated.

Relevant part of the CL description:

    The reason for the failed tests was that when caching location data, the
    extended time format past the end of zone transitions was not
    considered. The respective change was introduced in (*Location).lookup
    by CL 215539.

For #42138

Change-Id: I37f52a0917b2c6e3957e6b4612c8ef104c736e65
Reviewed-on: https://go-review.googlesource.com/c/go/+/264301
Trust: Ian Lance Taylor &lt;iant@golang.org&gt;
Reviewed-by: Tobias Klauser &lt;tobias.klauser@gmail.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.15] compress/flate: fix corrupted output</title>
<updated>2020-10-29T18:54:36Z</updated>
<author>
<name>Klaus Post</name>
<email>klauspost@gmail.com</email>
</author>
<published>2020-10-17T15:19:53Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=777e455106b784b49bf0fe969bcdf802a1104026'/>
<id>urn:sha1:777e455106b784b49bf0fe969bcdf802a1104026</id>
<content type='text'>
The fastest compression mode can pick up a false match for every 2GB
of input data resulting in incorrectly decompressed data.

Since matches are allowed to be up to and including at maxMatchOffset
we must offset the buffer by an additional element to prevent the first
4 bytes to match after an out-of-reach value after shiftOffsets has
been called.

We offset by `maxMatchOffset + 1` so offset 0 in the table will now
fail the `if offset &gt; maxMatchOffset` in all cases.

Updates #41420.
Fixes #41463.

Change-Id: If1fbe01728e132b8a207e3f3f439edd832dcc710
GitHub-Last-Rev: 50fabab0da874c37543b139459a810e12e83cee2
GitHub-Pull-Request: golang/go#41477
Reviewed-on: https://go-review.googlesource.com/c/go/+/255879
Reviewed-by: Matthew Dempsky &lt;mdempsky@google.com&gt;
Run-TryBot: Matthew Dempsky &lt;mdempsky@google.com&gt;
TryBot-Result: Go Bot &lt;gobot@golang.org&gt;
Trust: Joe Tsai &lt;thebrokentoaster@gmail.com&gt;
Trust: Matthew Dempsky &lt;mdempsky@google.com&gt;
(cherry picked from commit ab541a0560408999ac65d12bec2a3057994eda38)
Reviewed-on: https://go-review.googlesource.com/c/go/+/266177
Run-TryBot: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
Trust: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
Reviewed-by: Joe Tsai &lt;thebrokentoaster@gmail.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.15] cmd/go/internal/modfetch: drop gopkg.in/russross/blackfriday.v2 from TestCodeRepoVersions</title>
<updated>2020-10-29T18:53:25Z</updated>
<author>
<name>Tobias Klauser</name>
<email>tklauser@distanz.ch</email>
</author>
<published>2020-10-28T12:44:53Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=8687f6d924ee3a311e08db855c6dc1024c1f9349'/>
<id>urn:sha1:8687f6d924ee3a311e08db855c6dc1024c1f9349</id>
<content type='text'>
Follow-up for CL 265819.

Given the -pre tag added recently, a new stable version is likely
tagged soon. This would break TestCodeRepoVersions on the longtest
builders again. Since the other test cases in codeRepoVersionsTests
already provide enough coverage, drop gopkg.in/russross/blackfriday.v2
to avoid breaking TestCodeRepoVersions once the release happens.

Updates #28856

Change-Id: If86a637b5e47f59faf9048fc1cbbae6e8f1dcc53
Reviewed-on: https://go-review.googlesource.com/c/go/+/265917
Trust: Tobias Klauser &lt;tobias.klauser@gmail.com&gt;
Run-TryBot: Tobias Klauser &lt;tobias.klauser@gmail.com&gt;
Reviewed-by: Bryan C. Mills &lt;bcmills@google.com&gt;
Reviewed-by: Jay Conrod &lt;jayconrod@google.com&gt;
TryBot-Result: Go Bot &lt;gobot@golang.org&gt;
(cherry picked from commit 421d4e72de802ed65cb38317660654771cfb13e9)
Reviewed-on: https://go-review.googlesource.com/c/go/+/266178
Trust: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
Trust: Jay Conrod &lt;jayconrod@google.com&gt;
Run-TryBot: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
Reviewed-by: Tobias Klauser &lt;tobias.klauser@gmail.com&gt;
</content>
</entry>
</feed>
