<feed xmlns='http://www.w3.org/2005/Atom'>
<title>go, branch go1.20.10</title>
<subtitle>Fork of Go programming language with my patches.</subtitle>
<id>http://git.kilabit.info/go/atom?h=go1.20.10</id>
<link rel='self' href='http://git.kilabit.info/go/atom?h=go1.20.10'/>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/'/>
<updated>2023-10-10T16:26:21Z</updated>
<entry>
<title>[release-branch.go1.20] go1.20.10</title>
<updated>2023-10-10T16:26:21Z</updated>
<author>
<name>Gopher Robot</name>
<email>gobot@golang.org</email>
</author>
<published>2023-10-10T16:24:20Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=8042fd87f37a725e34407994c9a11aaf95f5af45'/>
<id>urn:sha1:8042fd87f37a725e34407994c9a11aaf95f5af45</id>
<content type='text'>
Change-Id: I328fce7b2411092a066ee32dd77f18ec5744e707
Reviewed-on: https://go-review.googlesource.com/c/go/+/534336
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Commit-Queue: Gopher Robot &lt;gobot@golang.org&gt;
Reviewed-by: Heschi Kreinick &lt;heschi@google.com&gt;
Auto-Submit: Gopher Robot &lt;gobot@golang.org&gt;
TryBot-Bypass: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Reviewed-by: Michael Pratt &lt;mpratt@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.20] net/http: regenerate h2_bundle.go</title>
<updated>2023-10-10T16:18:02Z</updated>
<author>
<name>Damien Neil</name>
<email>dneil@google.com</email>
</author>
<published>2023-10-06T21:16:27Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=e175f27f58aa7b9cd4d79607ae65d2cd5baaee68'/>
<id>urn:sha1:e175f27f58aa7b9cd4d79607ae65d2cd5baaee68</id>
<content type='text'>
Pull in a security fix from x/net/http2:
http2: limit maximum handler goroutines to MaxConcurrentStreamso

For #63417
Fixes #63426
Fixes CVE-2023-39325

Change-Id: I6e32397323cd9b4114c990fcc9d19557a7f5f619
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/2047401
Reviewed-by: Tatiana Bradley &lt;tatianabradley@google.com&gt;
TryBot-Result: Security TryBots &lt;security-trybots@go-security-trybots.iam.gserviceaccount.com&gt;
Run-TryBot: Damien Neil &lt;dneil@google.com&gt;
Reviewed-by: Ian Cottrell &lt;iancottrell@google.com&gt;
Reviewed-on: https://go-review.googlesource.com/c/go/+/534255
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Reviewed-by: Damien Neil &lt;dneil@google.com&gt;
TryBot-Bypass: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Reviewed-by: Michael Pratt &lt;mpratt@google.com&gt;
Auto-Submit: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.20] go1.20.9</title>
<updated>2023-10-05T19:28:06Z</updated>
<author>
<name>Gopher Robot</name>
<email>gobot@golang.org</email>
</author>
<published>2023-10-05T18:32:36Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=68f9a6e2addc828246992e66e79c6a51a32d1d71'/>
<id>urn:sha1:68f9a6e2addc828246992e66e79c6a51a32d1d71</id>
<content type='text'>
Change-Id: Ic4eedc3dc193c335784b5a86214ea2e655e631a7
Reviewed-on: https://go-review.googlesource.com/c/go/+/533237
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Reviewed-by: Michael Pratt &lt;mpratt@google.com&gt;
TryBot-Bypass: Michael Pratt &lt;mpratt@google.com&gt;
Auto-Submit: Gopher Robot &lt;gobot@golang.org&gt;
Reviewed-by: Than McIntosh &lt;thanm@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.20] cmd/compile: use absolute file name in isCgo check</title>
<updated>2023-10-05T18:31:32Z</updated>
<author>
<name>Ian Lance Taylor</name>
<email>iant@golang.org</email>
</author>
<published>2023-09-20T23:16:29Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=31d5b604ac0adb58aec4870ac1b974c08312fd49'/>
<id>urn:sha1:31d5b604ac0adb58aec4870ac1b974c08312fd49</id>
<content type='text'>
For #23672
Updates #63211
Fixes #63213
Fixes CVE-2023-39323

Change-Id: I4586a69e1b2560036afec29d53e53cf25e6c7352
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/2032884
Reviewed-by: Matthew Dempsky &lt;mdempsky@google.com&gt;
Reviewed-by: Roland Shoemaker &lt;bracewell@google.com&gt;
(cherry picked from commit 9b19e751918dd218035811b1ef83a8c2693b864a)
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/2037629
Reviewed-by: Tatiana Bradley &lt;tatianabradley@google.com&gt;
Run-TryBot: Roland Shoemaker &lt;bracewell@google.com&gt;
Reviewed-by: Damien Neil &lt;dneil@google.com&gt;
Reviewed-on: https://go-review.googlesource.com/c/go/+/533195
Auto-Submit: Michael Pratt &lt;mpratt@google.com&gt;
Reviewed-by: Ian Lance Taylor &lt;iant@google.com&gt;
TryBot-Bypass: Michael Pratt &lt;mpratt@google.com&gt;
Reviewed-by: Than McIntosh &lt;thanm@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.20] cmd/link: suppress -bind_at_load deprecation warning for ld-prime</title>
<updated>2023-09-21T22:22:16Z</updated>
<author>
<name>Cherry Mui</name>
<email>cherryyz@google.com</email>
</author>
<published>2023-07-10T22:50:06Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=83dce45959669a3b090d6701605a7ba408a10587'/>
<id>urn:sha1:83dce45959669a3b090d6701605a7ba408a10587</id>
<content type='text'>
ld-prime emits a deprecation warning for -bind_at_load. The flag
is needed for plugins to not deadlock (#38824) when linking with
older darwin linker. It is supposedly not needed with newer linker
when chained fixups are used. For now, we always pass it, and
suppress the warning.

Updates #61229.
For #62597.

Change-Id: I4b8a6f864a460c40dc38adbb533f664f7fd5343c
Reviewed-on: https://go-review.googlesource.com/c/go/+/508696
Reviewed-by: Than McIntosh &lt;thanm@google.com&gt;
TryBot-Result: Gopher Robot &lt;gobot@golang.org&gt;
Run-TryBot: Cherry Mui &lt;cherryyz@google.com&gt;
(cherry picked from commit 040dbf9c181a0e3ea9f7bd3ebe3f75acdc878aaf)
Reviewed-on: https://go-review.googlesource.com/c/go/+/527798
</content>
</entry>
<entry>
<title>[release-branch.go1.20] cmd/link: disable DWARF by default in c-shared mode on darwin</title>
<updated>2023-09-21T22:20:27Z</updated>
<author>
<name>Cherry Mui</name>
<email>cherryyz@google.com</email>
</author>
<published>2023-09-12T19:42:29Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=08c544db98da4292edfc5da7ceca17808fd41168'/>
<id>urn:sha1:08c544db98da4292edfc5da7ceca17808fd41168</id>
<content type='text'>
[This is a (manual) backport of CL 527415 to Go 1.20.]

Currently, linking a Go c-shared object with C code using Apple's
new linker, it fails with

% cc a.c go.so
ld: segment '__DWARF' filesize exceeds vmsize in 'go.so'

Apple's new linker has more checks for unmapped segments. It is
very hard to make it accept a Mach-O shared object with an
additional DWARF segment.

We may want to stop combinding DWARF into the shared object (see
also #62577). For now, disable DWARF by default in c-shared mode
on darwin.

Updates #61229.
For #62597.

Change-Id: I313349f71296d6d7025db28469593825ce9f1866
Reviewed-on: https://go-review.googlesource.com/c/go/+/527819
TryBot-Result: Gopher Robot &lt;gobot@golang.org&gt;
Reviewed-by: Than McIntosh &lt;thanm@google.com&gt;
Run-TryBot: Cherry Mui &lt;cherryyz@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.20] cmd/link: force old Apple linker in plugin mode</title>
<updated>2023-09-21T22:20:16Z</updated>
<author>
<name>Cherry Mui</name>
<email>cherryyz@google.com</email>
</author>
<published>2023-09-12T19:40:09Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=071f03a8e59fc404a823e547fa566983c60f1f07'/>
<id>urn:sha1:071f03a8e59fc404a823e547fa566983c60f1f07</id>
<content type='text'>
There are some bugs in Apple's new linker that probably will not
be fixed when Xcode 15 is released (some time soon). We fix/work
around them but it is too much to backport them all. Force old
Apple linker to work around.

Updates #61229.
For #62597.

Change-Id: Ia5941918e882b22b4dbc41c74764d19d413d0b56
Reviewed-on: https://go-review.googlesource.com/c/go/+/527818
Run-TryBot: Cherry Mui &lt;cherryyz@google.com&gt;
TryBot-Result: Gopher Robot &lt;gobot@golang.org&gt;
Reviewed-by: Than McIntosh &lt;thanm@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.20] go1.20.8</title>
<updated>2023-09-06T15:31:47Z</updated>
<author>
<name>Gopher Robot</name>
<email>gobot@golang.org</email>
</author>
<published>2023-09-06T14:25:34Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=d5b851804329aa547dafa278a0c35dd62298d651'/>
<id>urn:sha1:d5b851804329aa547dafa278a0c35dd62298d651</id>
<content type='text'>
Change-Id: Iac628daa970d01c5958839fcf668106e93bce8b0
Reviewed-on: https://go-review.googlesource.com/c/go/+/526037
Reviewed-by: Joedian Reid &lt;joedian@golang.org&gt;
TryBot-Result: Gopher Robot &lt;gobot@golang.org&gt;
Auto-Submit: Gopher Robot &lt;gobot@golang.org&gt;
Run-TryBot: Cherry Mui &lt;cherryyz@google.com&gt;
Reviewed-by: Cherry Mui &lt;cherryyz@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.20] html/template: properly handle special tags within the script context</title>
<updated>2023-09-06T14:22:36Z</updated>
<author>
<name>Roland Shoemaker</name>
<email>bracewell@google.com</email>
</author>
<published>2023-08-03T19:28:28Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=2070531d2f53df88e312edace6c8dfc9686ab2f5'/>
<id>urn:sha1:2070531d2f53df88e312edace6c8dfc9686ab2f5</id>
<content type='text'>
The HTML specification has incredibly complex rules for how to handle
"&lt;!--", "&lt;script", and "&lt;/script" when they appear within literals in
the script context. Rather than attempting to apply these restrictions
(which require a significantly more complex state machine) we apply
the workaround suggested in section 4.12.1.3 of the HTML specification [1].

More precisely, when "&lt;!--", "&lt;script", and "&lt;/script" appear within
literals (strings and regular expressions, ignoring comments since we
already elide their content) we replace the "&lt;" with "\x3C". This avoids
the unintuitive behavior that using these tags within literals can cause,
by simply preventing the rendered content from triggering it. This may
break some correct usages of these tags, but on balance is more likely
to prevent XSS attacks where users are unknowingly either closing or not
closing the script blocks where they think they are.

Thanks to Takeshi Kaneko (GMO Cybersecurity by Ierae, Inc.) for
reporting this issue.

Fixes #62197
Fixes #62397
Fixes CVE-2023-39319

[1] https://html.spec.whatwg.org/#restrictions-for-contents-of-script-elements

Change-Id: Iab57b0532694827e3eddf57a7497ba1fab1746dc
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1976594
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Reviewed-by: Tatiana Bradley &lt;tatianabradley@google.com&gt;
Reviewed-by: Damien Neil &lt;dneil@google.com&gt;
Run-TryBot: Roland Shoemaker &lt;bracewell@google.com&gt;
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/2014621
TryBot-Result: Security TryBots &lt;security-trybots@go-security-trybots.iam.gserviceaccount.com&gt;
Reviewed-on: https://go-review.googlesource.com/c/go/+/526099
TryBot-Result: Gopher Robot &lt;gobot@golang.org&gt;
Run-TryBot: Cherry Mui &lt;cherryyz@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.20] html/template: support HTML-like comments in script contexts</title>
<updated>2023-09-06T14:22:29Z</updated>
<author>
<name>Roland Shoemaker</name>
<email>bracewell@google.com</email>
</author>
<published>2023-08-03T19:24:13Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=023b542edf38e2a1f87fcefb9f75ff2f99401b4c'/>
<id>urn:sha1:023b542edf38e2a1f87fcefb9f75ff2f99401b4c</id>
<content type='text'>
Per Appendix B.1.1 of the ECMAScript specification, support HTML-like
comments in script contexts. Also per section 12.5, support hashbang
comments. This brings our parsing in-line with how browsers treat these
comment types.

Thanks to Takeshi Kaneko (GMO Cybersecurity by Ierae, Inc.) for
reporting this issue.

Fixes #62196
Fixes #62395
Fixes CVE-2023-39318

Change-Id: Id512702c5de3ae46cf648e268cb10e1eb392a181
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1976593
Run-TryBot: Roland Shoemaker &lt;bracewell@google.com&gt;
Reviewed-by: Tatiana Bradley &lt;tatianabradley@google.com&gt;
Reviewed-by: Damien Neil &lt;dneil@google.com&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/2014620
Reviewed-on: https://go-review.googlesource.com/c/go/+/526098
Run-TryBot: Cherry Mui &lt;cherryyz@google.com&gt;
TryBot-Result: Gopher Robot &lt;gobot@golang.org&gt;
</content>
</entry>
</feed>
