<feed xmlns='http://www.w3.org/2005/Atom'>
<title>go, branch go1.23.6</title>
<subtitle>Fork of Go programming language with my patches.</subtitle>
<id>http://git.kilabit.info/go/atom?h=go1.23.6</id>
<link rel='self' href='http://git.kilabit.info/go/atom?h=go1.23.6'/>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/'/>
<updated>2025-02-04T16:39:47Z</updated>
<entry>
<title>[release-branch.go1.23] go1.23.6</title>
<updated>2025-02-04T16:39:47Z</updated>
<author>
<name>Gopher Robot</name>
<email>gobot@golang.org</email>
</author>
<published>2025-02-04T16:13:44Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=a991f9c34d454d3d844f21dc08f2d05df35a8c60'/>
<id>urn:sha1:a991f9c34d454d3d844f21dc08f2d05df35a8c60</id>
<content type='text'>
Change-Id: Iec54508cfd791299630ae4b784667cd2643c4c15
Reviewed-on: https://go-review.googlesource.com/c/go/+/646221
Reviewed-by: Carlos Amedee &lt;carlos@golang.org&gt;
Reviewed-by: Cherry Mui &lt;cherryyz@google.com&gt;
Auto-Submit: Gopher Robot &lt;gobot@golang.org&gt;
TryBot-Bypass: Cherry Mui &lt;cherryyz@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.23] crypto/internal/fips140/nistec: make p256NegCond constant time on ppc64le</title>
<updated>2025-01-31T17:38:23Z</updated>
<author>
<name>Roland Shoemaker</name>
<email>roland@golang.org</email>
</author>
<published>2025-01-22T00:03:14Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=6644ed63b1e6ccc129647ef6b0d4647fdbe14056'/>
<id>urn:sha1:6644ed63b1e6ccc129647ef6b0d4647fdbe14056</id>
<content type='text'>
Remove the branching instruction from p256NegCond which made it variable
time. The technique used matches that used in p256MovCond.

Fixes #71383
Fixes #71423
Fixes CVE-2025-22866

Change-Id: Ibc2a46814d856cbbdaf6cc0c5a415ed5d42ca793
Reviewed-on: https://go-review.googlesource.com/c/go/+/643735
Reviewed-by: David Chase &lt;drchase@google.com&gt;
Reviewed-by: Filippo Valsorda &lt;filippo@golang.org&gt;
Reviewed-by: Paul Murphy &lt;murp@ibm.com&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
(cherry picked from commit 6fc23a3cff5e38ff72923fee50f51254dcdc6e93)
Reviewed-on: https://go-review.googlesource.com/c/go/+/645515
Reviewed-by: Carlos Amedee &lt;carlos@golang.org&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.23] cmd/go/internal/modfetch: do not trust server to send all tags in shallow fetch</title>
<updated>2025-01-17T16:30:53Z</updated>
<author>
<name>Russ Cox</name>
<email>rsc@golang.org</email>
</author>
<published>2025-01-14T04:00:14Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=ab44565bcd9ad975b87ffd78c36c1fae1644d0bf'/>
<id>urn:sha1:ab44565bcd9ad975b87ffd78c36c1fae1644d0bf</id>
<content type='text'>
Newer git versions (at least git 2.47.1) do not send all the matching tags
for a shallow fetch of a specific hash anymore. The go command assumes
that git servers do this. Since that assumption is broken, use the local
copy of the remote refs list to augment the tags sent by the server.
This makes the cmd/go/internal/modfetch tests pass again with newer git.

For #71261
Fixes #71263

Change-Id: I9fd4f3fd7beeb68a522938599f8f3acd887d0b26
Reviewed-on: https://go-review.googlesource.com/c/go/+/642437
Reviewed-by: Michael Matloob &lt;matloob@golang.org&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Auto-Submit: Russ Cox &lt;rsc@golang.org&gt;
(cherry picked from commit bd80d8956f3062d2b2bff2d7da6b879dfa909f12)
Reviewed-on: https://go-review.googlesource.com/c/go/+/642696
Reviewed-by: Michael Knyszek &lt;mknyszek@google.com&gt;
Reviewed-by: Russ Cox &lt;rsc@golang.org&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.23] cmd/compile: fix write barrier coalescing</title>
<updated>2025-01-17T15:41:09Z</updated>
<author>
<name>Keith Randall</name>
<email>khr@golang.org</email>
</author>
<published>2025-01-11T01:33:26Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=9cbbf5e0f4fe5231a5ad425638800618839de0a5'/>
<id>urn:sha1:9cbbf5e0f4fe5231a5ad425638800618839de0a5</id>
<content type='text'>
We can't coalesce a non-WB store with a subsequent Move, as the
result of the store might be the source of the move.

There's a simple codegen test. Not sure how we might do a real test,
as all the repro's I've come up with are very expensive and unreliable.

Fixes #71230

Change-Id: If18bf181a266b9b90964e2591cd2e61a7168371c
Reviewed-on: https://go-review.googlesource.com/c/go/+/642197
Reviewed-by: Keith Randall &lt;khr@google.com&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Reviewed-by: David Chase &lt;drchase@google.com&gt;
Reviewed-on: https://go-review.googlesource.com/c/go/+/642498
</content>
</entry>
<entry>
<title>[release-branch.go1.23] go1.23.5</title>
<updated>2025-01-16T20:07:56Z</updated>
<author>
<name>Gopher Robot</name>
<email>gobot@golang.org</email>
</author>
<published>2025-01-16T19:41:53Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=d04e3cbc9240e25de449dcae2ec33d03062f347b'/>
<id>urn:sha1:d04e3cbc9240e25de449dcae2ec33d03062f347b</id>
<content type='text'>
Change-Id: I849328cf93adf24c223f103f5b834635970ea652
Reviewed-on: https://go-review.googlesource.com/c/go/+/643137
Reviewed-by: Michael Knyszek &lt;mknyszek@google.com&gt;
Reviewed-by: Michael Pratt &lt;mpratt@google.com&gt;
Auto-Submit: Gopher Robot &lt;gobot@golang.org&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.23] net/http: persist header stripping across repeated redirects</title>
<updated>2025-01-16T19:00:39Z</updated>
<author>
<name>Damien Neil</name>
<email>dneil@google.com</email>
</author>
<published>2024-11-22T20:34:11Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=bb8230f80535945648e8b56739ad450cf433eba9'/>
<id>urn:sha1:bb8230f80535945648e8b56739ad450cf433eba9</id>
<content type='text'>
When an HTTP redirect changes the host of a request, we drop
sensitive headers such as Authorization from the redirected request.
Fix a bug where a chain of redirects could result in sensitive
headers being sent to the wrong host:

  1. request to a.tld with Authorization header
  2. a.tld redirects to b.tld
  3. request to b.tld with no Authorization header
  4. b.tld redirects to b.tld
  3. request to b.tld with Authorization header restored

Thanks to Kyle Seely for reporting this issue.

For #70530
Fixes ##71211
Fixes CVE-2024-45336

Reviewed-on: https://go-internal-review.googlesource.com/c/go/+/1641
Reviewed-by: Roland Shoemaker &lt;bracewell@google.com&gt;
Reviewed-by: Tatiana Bradley &lt;tatianabradley@google.com&gt;
Commit-Queue: Roland Shoemaker &lt;bracewell@google.com&gt;
Change-Id: I326544358de71ff892d9e9fe338252a5dd04001f
Reviewed-on: https://go-internal-review.googlesource.com/c/go/+/1764
Reviewed-on: https://go-review.googlesource.com/c/go/+/643104
Auto-Submit: Michael Knyszek &lt;mknyszek@google.com&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Reviewed-by: Michael Pratt &lt;mpratt@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.23] crypto/x509: properly check for IPv6 hosts in URIs</title>
<updated>2025-01-16T19:00:37Z</updated>
<author>
<name>Roland Shoemaker</name>
<email>bracewell@google.com</email>
</author>
<published>2024-12-09T19:31:22Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=fdb8413fe588ec6dc31f1deaf43eb7202a76bb79'/>
<id>urn:sha1:fdb8413fe588ec6dc31f1deaf43eb7202a76bb79</id>
<content type='text'>
When checking URI constraints, use netip.ParseAddr, which understands
zones, unlike net.ParseIP which chokes on them. This prevents zone IDs
from mistakenly satisfying URI constraints.

Thanks to Juho Forsén of Mattermost for reporting this issue.

For #71156
Fixes #71208
Fixes CVE-2024-45341

Change-Id: Iecac2529f3605382d257996e0fb6d6983547e400
Reviewed-on: https://go-internal-review.googlesource.com/c/go/+/1700
Reviewed-by: Tatiana Bradley &lt;tatianabradley@google.com&gt;
Reviewed-by: Damien Neil &lt;dneil@google.com&gt;
(cherry picked from commit 22ca55d396ba801e6ae9b2bd67a059fcb30562fd)
Reviewed-on: https://go-internal-review.googlesource.com/c/go/+/1762
Reviewed-by: Roland Shoemaker &lt;bracewell@google.com&gt;
Reviewed-on: https://go-review.googlesource.com/c/go/+/643103
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Auto-Submit: Michael Knyszek &lt;mknyszek@google.com&gt;
Reviewed-by: Michael Pratt &lt;mpratt@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.23] runtime: hold traceAcquire across casgstatus in injectglist</title>
<updated>2025-01-08T18:02:57Z</updated>
<author>
<name>Michael Anthony Knyszek</name>
<email>mknyszek@google.com</email>
</author>
<published>2024-12-23T17:21:07Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=1dde0b484489653136a54df9932cc8d1c0fb6d1b'/>
<id>urn:sha1:1dde0b484489653136a54df9932cc8d1c0fb6d1b</id>
<content type='text'>
Currently injectglist emits all the trace events before actually calling
casgstatus on each goroutine. This is a problem, since tracing can
observe an inconsistent state (gstatus does not match tracer's 'emitted
an event' state).

This change fixes the problem by having injectglist do what every other
scheduler function does, and that's wrap each call to casgstatus in
traceAcquire/traceRelease.

For #70883.
Fixes #71147.

Change-Id: I857e96cec01688013597e8efc0c4c3d0b72d3a70
Reviewed-on: https://go-review.googlesource.com/c/go/+/638558
Reviewed-by: Michael Pratt &lt;mpratt@google.com&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
(cherry picked from commit f025d19e7b3f0c66242760c213cc2b54cb100f69)
Reviewed-on: https://go-review.googlesource.com/c/go/+/641378
Auto-Submit: Michael Pratt &lt;mpratt@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.23] crypto/tls: fix Config.Time in tests using expired certificates</title>
<updated>2025-01-08T17:33:16Z</updated>
<author>
<name>Filippo Valsorda</name>
<email>filippo@golang.org</email>
</author>
<published>2025-01-02T00:34:40Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=3417000c69bc89c173cfafcf3f2a06a408b32880'/>
<id>urn:sha1:3417000c69bc89c173cfafcf3f2a06a408b32880</id>
<content type='text'>
Updates #71077
Fixes #71104

Change-Id: I6a6a465685f3bd50a5bb35a160f87b59b74fa6af
Reviewed-on: https://go-review.googlesource.com/c/go/+/639655
Auto-Submit: Ian Lance Taylor &lt;iant@google.com&gt;
Reviewed-by: Damien Neil &lt;dneil@google.com&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Auto-Submit: Filippo Valsorda &lt;filippo@golang.org&gt;
Auto-Submit: Damien Neil &lt;dneil@google.com&gt;
Reviewed-by: Joel Sing &lt;joel@sing.id.au&gt;
Reviewed-by: Ian Lance Taylor &lt;iant@google.com&gt;
Reviewed-on: https://go-review.googlesource.com/c/go/+/640315
Reviewed-by: Filippo Valsorda &lt;filippo@golang.org&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.23] net: don't use sendfile for irregular files; handle EOPNOTSUPP/ENOTSUP</title>
<updated>2024-12-18T17:42:15Z</updated>
<author>
<name>Ian Lance Taylor</name>
<email>iant@golang.org</email>
</author>
<published>2024-12-11T22:18:42Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=1576793c513c5cd8396d1a5b004b546e82efc033'/>
<id>urn:sha1:1576793c513c5cd8396d1a5b004b546e82efc033</id>
<content type='text'>
This is not a cherry pick, because the code has changed on tip.

For #70763
Fixes #70789

Change-Id: If9fcfee17e86a746cf8c72293dc34f80b430f6e6
Reviewed-on: https://go-review.googlesource.com/c/go/+/635397
Auto-Submit: Ian Lance Taylor &lt;iant@google.com&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Reviewed-by: Damien Neil &lt;dneil@google.com&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
</content>
</entry>
</feed>
