<feed xmlns='http://www.w3.org/2005/Atom'>
<title>go, branch go1.19.2</title>
<subtitle>Fork of Go programming language with my patches.</subtitle>
<id>http://git.kilabit.info/go/atom?h=go1.19.2</id>
<link rel='self' href='http://git.kilabit.info/go/atom?h=go1.19.2'/>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/'/>
<updated>2022-10-04T17:43:19Z</updated>
<entry>
<title>[release-branch.go1.19] go1.19.2</title>
<updated>2022-10-04T17:43:19Z</updated>
<author>
<name>Gopher Robot</name>
<email>gobot@golang.org</email>
</author>
<published>2022-10-04T17:10:28Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=895664482c0ebe5cec4a6935615a1e9610bbf1e3'/>
<id>urn:sha1:895664482c0ebe5cec4a6935615a1e9610bbf1e3</id>
<content type='text'>
Change-Id: Ia5de3a0fa07f212c5c19f9e01b0ed2cfab739e95
Reviewed-on: https://go-review.googlesource.com/c/go/+/438598
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Reviewed-by: Carlos Amedee &lt;carlos@golang.org&gt;
Auto-Submit: Gopher Robot &lt;gobot@golang.org&gt;
Run-TryBot: Gopher Robot &lt;gobot@golang.org&gt;
TryBot-Result: Gopher Robot &lt;gobot@golang.org&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.19] regexp: limit size of parsed regexps</title>
<updated>2022-10-04T17:08:16Z</updated>
<author>
<name>Russ Cox</name>
<email>rsc@golang.org</email>
</author>
<published>2022-09-28T15:18:51Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=645abfe529dc325e16daa17210640c2907d1c17a'/>
<id>urn:sha1:645abfe529dc325e16daa17210640c2907d1c17a</id>
<content type='text'>
Set a 128 MB limit on the amount of space used by []syntax.Inst
in the compiled form corresponding to a given regexp.

Also set a 128 MB limit on the rune storage in the *syntax.Regexp
tree itself.

Thanks to Adam Korczynski (ADA Logics) and OSS-Fuzz for reporting this issue.

Fixes CVE-2022-41715.
Updates #55949.
Fixes #55951.

Change-Id: Ia656baed81564436368cf950e1c5409752f28e1b
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1592047
Reviewed-by: Julie Qiu &lt;julieqiu@google.com&gt;
Reviewed-by: Damien Neil &lt;dneil@google.com&gt;
Run-TryBot: Roland Shoemaker &lt;bracewell@google.com&gt;
TryBot-Result: Security TryBots &lt;security-trybots@go-security-trybots.iam.gserviceaccount.com&gt;
Reviewed-on: https://go-review.googlesource.com/c/go/+/438499
Reviewed-by: Carlos Amedee &lt;carlos@golang.org&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Run-TryBot: Carlos Amedee &lt;carlos@golang.org&gt;
TryBot-Result: Gopher Robot &lt;gobot@golang.org&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.19] archive/tar: limit size of headers</title>
<updated>2022-10-04T17:07:45Z</updated>
<author>
<name>Damien Neil</name>
<email>dneil@google.com</email>
</author>
<published>2022-09-03T03:45:18Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=4fa773cdefd20be093c84f731be7d4febf5536fa'/>
<id>urn:sha1:4fa773cdefd20be093c84f731be7d4febf5536fa</id>
<content type='text'>
Set a 1MiB limit on special file blocks (PAX headers, GNU long names,
GNU link names), to avoid reading arbitrarily large amounts of data
into memory.

Thanks to Adam Korczynski (ADA Logics) and OSS-Fuzz for reporting
this issue.

Fixes CVE-2022-2879
Updates #54853
Fixes #55926

Change-Id: I85136d6ff1e0af101a112190e027987ab4335680
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1565555
Reviewed-by: Tatiana Bradley &lt;tatianabradley@google.com&gt;
Run-TryBot: Roland Shoemaker &lt;bracewell@google.com&gt;
Reviewed-by: Roland Shoemaker &lt;bracewell@google.com&gt;
(cherry picked from commit 6ee768cef6b82adf7a90dcf367a1699ef694f3b2)
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1591053
Reviewed-by: Julie Qiu &lt;julieqiu@google.com&gt;
Reviewed-by: Damien Neil &lt;dneil@google.com&gt;
Reviewed-on: https://go-review.googlesource.com/c/go/+/438498
TryBot-Result: Gopher Robot &lt;gobot@golang.org&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Reviewed-by: Carlos Amedee &lt;carlos@golang.org&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
Run-TryBot: Carlos Amedee &lt;carlos@golang.org&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.19] net/http/httputil: avoid query parameter smuggling</title>
<updated>2022-09-28T16:36:28Z</updated>
<author>
<name>Damien Neil</name>
<email>dneil@google.com</email>
</author>
<published>2022-09-22T20:32:00Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=f6d844510d5f1e3b3098eba255d9b633d45eac3b'/>
<id>urn:sha1:f6d844510d5f1e3b3098eba255d9b633d45eac3b</id>
<content type='text'>
Query parameter smuggling occurs when a proxy's interpretation
of query parameters differs from that of a downstream server.
Change ReverseProxy to avoid forwarding ignored query parameters.

Remove unparsable query parameters from the outbound request

   * if req.Form != nil after calling ReverseProxy.Director; and
   * before calling ReverseProxy.Rewrite.

This change preserves the existing behavior of forwarding the
raw query untouched if a Director hook does not parse the query
by calling Request.ParseForm (possibly indirectly).

Fixes #55843
For #54663
For CVE-2022-2880

Change-Id: If1621f6b0e73a49d79059dae9e6b256e0ff18ca9
Reviewed-on: https://go-review.googlesource.com/c/go/+/432976
Reviewed-by: Roland Shoemaker &lt;roland@golang.org&gt;
Reviewed-by: Brad Fitzpatrick &lt;bradfitz@golang.org&gt;
TryBot-Result: Gopher Robot &lt;gobot@golang.org&gt;
Run-TryBot: Damien Neil &lt;dneil@google.com&gt;
Reviewed-on: https://go-review.googlesource.com/c/go/+/433735
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.19] cmd/compile/internal/typebits: relax alignment check</title>
<updated>2022-09-21T22:25:31Z</updated>
<author>
<name>Cuong Manh Le</name>
<email>cuong.manhle.vn@gmail.com</email>
</author>
<published>2022-09-16T03:41:15Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=2614985ef7d252004c8bd2edddb7314446964874'/>
<id>urn:sha1:2614985ef7d252004c8bd2edddb7314446964874</id>
<content type='text'>
Now we have 8-byte alignment types on 32-bit system, so in some rare
case, e.g, generated wrapper for embedded interface, the function
argument may need more than 4 byte alignment. We could pad somehow, but
this is a rare case which makes it hard to ensure that we've got it right.

So relaxing the check for argument and return value region of the stack.

Fixes #55152

Change-Id: I34986e17a920254392a39439ad3dcb323da2ea8d
Reviewed-on: https://go-review.googlesource.com/c/go/+/431098
Reviewed-by: Keith Randall &lt;khr@golang.org&gt;
TryBot-Result: Gopher Robot &lt;gobot@golang.org&gt;
Reviewed-by: Cherry Mui &lt;cherryyz@google.com&gt;
Run-TryBot: Cuong Manh Le &lt;cuong.manhle.vn@gmail.com&gt;
Auto-Submit: Keith Randall &lt;khr@golang.org&gt;
Reviewed-by: Keith Randall &lt;khr@google.com&gt;
Reviewed-on: https://go-review.googlesource.com/c/go/+/431895
</content>
</entry>
<entry>
<title>[release-branch.go1.19] cmd/compile: skip emitting dictionaries with missing method expressions</title>
<updated>2022-09-21T21:03:45Z</updated>
<author>
<name>Matthew Dempsky</name>
<email>mdempsky@google.com</email>
</author>
<published>2022-09-08T21:31:42Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=3747bb2482b7ffccd7eafcf3be1df2de97427c1c'/>
<id>urn:sha1:3747bb2482b7ffccd7eafcf3be1df2de97427c1c</id>
<content type='text'>
The nounified frontend currently tries to construct dictionaries that
correspond to invalid instantiations (i.e., instantiations T[X] where
X does not satisfy the constraints specified on T's type parameter).
As a consequence, we may fail to find method expressions needed by the
dictionary.

The real fix for this is to avoid creating those dictionaries in the
first place, because they should never actually be needed at runtime.
But that seems scary for a backport: we've repeatedly attempted to
backport generics fixes, which have fixed one issue but introduced
another.

This CL is a minimally invasive solution to #54225, which avoids the
ICE by instead skipping emitting the invalid dictionary. If the
dictionary ends up not being needed (which I believe will always be
the case), then the linker's reachability analysis will simply ignore
its absence.

Or worst case, if the dictionary *is* reachable somehow, we've simply
turned an ICE into a link-time missing symbol failure. That's not
great for user experience, but it seems like a small trade off to
avoid risking breaking any other currently working code.

Fixes #55270.

Change-Id: Ic379696079f4729b1dd6a66994a58cca50281a84
Reviewed-on: https://go-review.googlesource.com/c/go/+/429655
Reviewed-by: Michael Knyszek &lt;mknyszek@google.com&gt;
Reviewed-by: Keith Randall &lt;khr@golang.org&gt;
Run-TryBot: Matthew Dempsky &lt;mdempsky@google.com&gt;
TryBot-Result: Gopher Robot &lt;gobot@golang.org&gt;
Reviewed-by: Cuong Manh Le &lt;cuong.manhle.vn@gmail.com&gt;
Reviewed-on: https://go-review.googlesource.com/c/go/+/429895
Reviewed-by: Keith Randall &lt;khr@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.19] cmd/link: suppress -no_pie deprecation warning on darwin</title>
<updated>2022-09-21T21:01:06Z</updated>
<author>
<name>Cherry Mui</name>
<email>cherryyz@google.com</email>
</author>
<published>2022-09-15T01:01:04Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=11728b38dc05b3b82fe5b98b0b5ce7263a3758aa'/>
<id>urn:sha1:11728b38dc05b3b82fe5b98b0b5ce7263a3758aa</id>
<content type='text'>
Apparently the new darwin linker starts to emit a warning about
-no_pie deprecation. Maybe we want to switch to PIE by default.
For now, suppress the warning. This also makes it easier for
backporting to previous releases.

Fixes #55114.
Updates #55112, #54482.

Change-Id: I1a3b74c237a9d00ec3b030fc3a9940a31e5cd37e
Reviewed-on: https://go-review.googlesource.com/c/go/+/430937
Run-TryBot: Cherry Mui &lt;cherryyz@google.com&gt;
Reviewed-by: Than McIntosh &lt;thanm@google.com&gt;
TryBot-Result: Gopher Robot &lt;gobot@golang.org&gt;
(cherry picked from commit 706d84fca2b36fdf670a0d921e6a8a3b481eaa05)
Reviewed-on: https://go-review.googlesource.com/c/go/+/431517
</content>
</entry>
<entry>
<title>[release-branch.go1.19] cmd/link: stop passing -pagezero_size to darwin linker</title>
<updated>2022-09-21T20:30:26Z</updated>
<author>
<name>Cherry Mui</name>
<email>cherryyz@google.com</email>
</author>
<published>2022-09-14T23:50:00Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=064f34f048f7d47c786a13b50d13b973bb9feeda'/>
<id>urn:sha1:064f34f048f7d47c786a13b50d13b973bb9feeda</id>
<content type='text'>
We added -pagezero_size in CL 72730, where it was intented for iOS.
The current code passes it only on macOS/AMD64 instead. It is not
really necessary there. Also, the new darwin linker starts to emit
a warning about deprecation of the flag. Stop passing it.

For #55114.
Updates #55112, #54482.

Change-Id: If9db7a1645c37d4284e48f075856912df8d8c1a0
Reviewed-on: https://go-review.googlesource.com/c/go/+/430936
TryBot-Result: Gopher Robot &lt;gobot@golang.org&gt;
Reviewed-by: Than McIntosh &lt;thanm@google.com&gt;
Run-TryBot: Cherry Mui &lt;cherryyz@google.com&gt;
(cherry picked from commit 5231ba2f054f2ecb1387bad00b8745d6fe532ea4)
Reviewed-on: https://go-review.googlesource.com/c/go/+/431515
Reviewed-by: Austin Clements &lt;austin@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.19] go/types, types2: allow (string...) signature with NewSignatureType</title>
<updated>2022-09-21T20:26:19Z</updated>
<author>
<name>Robert Griesemer</name>
<email>gri@golang.org</email>
</author>
<published>2022-09-12T22:51:32Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=a366ed5982d674d7e468ccc5f8b6c5b8a402a00a'/>
<id>urn:sha1:a366ed5982d674d7e468ccc5f8b6c5b8a402a00a</id>
<content type='text'>
Includes cases where the core type of the variadic parameter is
a slice or bytestring. Permits a client to create the signature
for various instantiations of append.

Fixes #55149.

Change-Id: I0f4983eb00c088cbe1d87954ee0b2df0ccc3bc49
Reviewed-on: https://go-review.googlesource.com/c/go/+/430455
TryBot-Result: Gopher Robot &lt;gobot@golang.org&gt;
Reviewed-by: Robert Findley &lt;rfindley@google.com&gt;
Auto-Submit: Robert Griesemer &lt;gri@google.com&gt;
Reviewed-by: Robert Griesemer &lt;gri@google.com&gt;
Run-TryBot: Robert Griesemer &lt;gri@google.com&gt;
Reviewed-on: https://go-review.googlesource.com/c/go/+/431935
</content>
</entry>
<entry>
<title>[release-branch.go1.19] cmd/compile: avoid using destination pointer base type in memmove optimization</title>
<updated>2022-09-21T20:24:34Z</updated>
<author>
<name>Keith Randall</name>
<email>khr@golang.org</email>
</author>
<published>2022-09-17T22:52:35Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=4b0e03da0e0c096b8e695d9e564a8ceac99f2d76'/>
<id>urn:sha1:4b0e03da0e0c096b8e695d9e564a8ceac99f2d76</id>
<content type='text'>
The type of the source and destination of a memmove call isn't
always accurate. It will always be a pointer (or an unsafe.Pointer), but
the base type might not be accurate. This comes about because multiple
copies of a pointer with different base types are coalesced into a single value.

In the failing example, the IData selector of the input argument is a
*[32]byte in one branch of the type switch, and a *[]byte in the other branch.
During the expand_calls pass both IDatas become just copies of the input
register. Those copies are deduped and an arbitrary one wins (in this case,
*[]byte is the unfortunate winner).

Generally an op v can rely on v.Type during rewrite rules. But relying
on v.Args[i].Type is discouraged.

Fixes #55124

Change-Id: I348fd9accf2058a87cd191eec01d39cda612f120
Reviewed-on: https://go-review.googlesource.com/c/go/+/431496
TryBot-Result: Gopher Robot &lt;gobot@golang.org&gt;
Reviewed-by: Cherry Mui &lt;cherryyz@google.com&gt;
Run-TryBot: Keith Randall &lt;khr@golang.org&gt;
Reviewed-by: Cuong Manh Le &lt;cuong.manhle.vn@gmail.com&gt;
Reviewed-by: Keith Randall &lt;khr@google.com&gt;
(cherry picked from commit e283473ebbebf4a80db166e7e852d03c5cff1a61)
Reviewed-on: https://go-review.googlesource.com/c/go/+/431917
</content>
</entry>
</feed>
