<feed xmlns='http://www.w3.org/2005/Atom'>
<title>go, branch go1.24.11</title>
<subtitle>Fork of Go programming language with my patches.</subtitle>
<id>http://git.kilabit.info/go/atom?h=go1.24.11</id>
<link rel='self' href='http://git.kilabit.info/go/atom?h=go1.24.11'/>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/'/>
<updated>2025-12-02T16:04:21Z</updated>
<entry>
<title>[release-branch.go1.24] go1.24.11</title>
<updated>2025-12-02T16:04:21Z</updated>
<author>
<name>Gopher Robot</name>
<email>gobot@golang.org</email>
</author>
<published>2025-12-02T15:59:53Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=1296453960bac0fb5675853c40e3747e5237e16e'/>
<id>urn:sha1:1296453960bac0fb5675853c40e3747e5237e16e</id>
<content type='text'>
Change-Id: Iae7d7cf17bf31ac6aaf145993d0b857a3ddbcacb
Reviewed-on: https://go-review.googlesource.com/c/go/+/725841
TryBot-Bypass: Gopher Robot &lt;gobot@golang.org&gt;
Reviewed-by: Mark Freeman &lt;markfreeman@google.com&gt;
Auto-Submit: Gopher Robot &lt;gobot@golang.org&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.24] crypto/x509: prevent HostnameError.Error() from consuming excessive resource</title>
<updated>2025-12-02T15:51:02Z</updated>
<author>
<name>Nicholas S. Husin</name>
<email>nsh@golang.org</email>
</author>
<published>2025-11-24T19:56:23Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=3a842bd5c6aa8eefa13c0174de3ab361e50bd672'/>
<id>urn:sha1:3a842bd5c6aa8eefa13c0174de3ab361e50bd672</id>
<content type='text'>
Constructing HostnameError.Error() takes O(N^2) runtime due to using a
string concatenation in a loop. Additionally, there is no limit on how
many names are included in the error message. As a result, a malicious
attacker could craft a certificate with an infinite amount of names to
unfairly consume resource.

To remediate this, we will now use strings.Builder to construct the
error message, preventing O(N^2) runtime. When a certificate has 100 or
more names, we will also not print each name individually.

Thanks to Philippe Antoine (Catena cyber) for reporting this issue.

Updates #76445
Fixes #76460
Fixes CVE-2025-61729

Change-Id: I6343776ec3289577abc76dad71766c491c1a7c81
Reviewed-on: https://go-internal-review.googlesource.com/c/go/+/3000
Reviewed-by: Neal Patel &lt;nealpatel@google.com&gt;
Reviewed-by: Damien Neil &lt;dneil@google.com&gt;
Reviewed-on: https://go-internal-review.googlesource.com/c/go/+/3220
Reviewed-by: Roland Shoemaker &lt;bracewell@google.com&gt;
Reviewed-on: https://go-review.googlesource.com/c/go/+/725820
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
TryBot-Bypass: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
Auto-Submit: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Reviewed-by: Mark Freeman &lt;markfreeman@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.24] crypto/x509: excluded subdomain constraints preclude wildcard SANs</title>
<updated>2025-11-25T20:14:29Z</updated>
<author>
<name>Roland Shoemaker</name>
<email>bracewell@google.com</email>
</author>
<published>2025-11-24T16:46:08Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=04db77a423cac75bb82cc9a6859991ae9c016344'/>
<id>urn:sha1:04db77a423cac75bb82cc9a6859991ae9c016344</id>
<content type='text'>
When evaluating name constraints in a certificate chain, the presence of
an excluded subdomain constraint (e.g., excluding "test.example.com")
should preclude the use of a wildcard SAN (e.g., "*.example.com").

Fixes #76442
Fixes #76463
Fixes CVE-2025-61727

Change-Id: I42a0da010cb36d2ec9d1239ae3f61cf25eb78bba
Reviewed-on: https://go-review.googlesource.com/c/go/+/724401
Reviewed-by: Nicholas Husin &lt;husin@google.com&gt;
Reviewed-by: Daniel McCarney &lt;daniel@binaryparadox.net&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Reviewed-by: Nicholas Husin &lt;nsh@golang.org&gt;
Reviewed-by: Neal Patel &lt;nealpatel@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.24] internal/cpu: use correct variable when parsing CPU features lamcas and lam_bh on loong64</title>
<updated>2025-11-25T18:05:20Z</updated>
<author>
<name>Guoqi Chen</name>
<email>chenguoqi@loongson.cn</email>
</author>
<published>2025-03-06T12:07:24Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=23743a8d2b1347eaf6279f401f743eeafab399a2'/>
<id>urn:sha1:23743a8d2b1347eaf6279f401f743eeafab399a2</id>
<content type='text'>
Fixes #76378

Change-Id: I5019f4e32243911f735f775bcb3c0dba5adb4162
Reviewed-on: https://go-review.googlesource.com/c/go/+/655395
Reviewed-by: David Chase &lt;drchase@google.com&gt;
Reviewed-by: Junyang Shao &lt;shaojunyang@google.com&gt;
Reviewed-by: Meidan Li &lt;limeidan@loongson.cn&gt;
Reviewed-by: sophie zhao &lt;zhaoxiaolin@loongson.cn&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
(cherry picked from commit bcd0ebbd2abcd3e2e876862f287c46a2de56eaab)
Reviewed-on: https://go-review.googlesource.com/c/go/+/722400
Reviewed-by: abner chenc &lt;chenguoqi@loongson.cn&gt;
Reviewed-by: Mark Freeman &lt;markfreeman@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.24] go1.24.10</title>
<updated>2025-11-05T19:01:51Z</updated>
<author>
<name>Gopher Robot</name>
<email>gobot@golang.org</email>
</author>
<published>2025-11-05T18:58:48Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=0259df17feb288f1e24517516939b67876c2627b'/>
<id>urn:sha1:0259df17feb288f1e24517516939b67876c2627b</id>
<content type='text'>
Change-Id: I74370108e95298bec0fe0f7738867072ece0d0ff
Reviewed-on: https://go-review.googlesource.com/c/go/+/718063
TryBot-Bypass: Gopher Robot &lt;gobot@golang.org&gt;
Auto-Submit: Gopher Robot &lt;gobot@golang.org&gt;
Reviewed-by: Michael Knyszek &lt;mknyszek@google.com&gt;
Reviewed-by: Michael Pratt &lt;mpratt@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.24] encoding/pem: properly calculate end indexes</title>
<updated>2025-10-29T16:22:33Z</updated>
<author>
<name>Roland Shoemaker</name>
<email>roland@golang.org</email>
</author>
<published>2025-10-23T15:16:39Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=562709bcf5b8f480d722d2f369d7757cb135e9ab'/>
<id>urn:sha1:562709bcf5b8f480d722d2f369d7757cb135e9ab</id>
<content type='text'>
When a block is missing the END line trailer, calculate the indexes of
the end and end trailer _before_ continuing the loop, making the
reslicing at the start of the loop work as expected.

Fixes #76028

Change-Id: If45c8cb473315623618f02cc7609f517a72d232d
Reviewed-on: https://go-review.googlesource.com/c/go/+/714200
Auto-Submit: Roland Shoemaker &lt;roland@golang.org&gt;
Reviewed-by: Damien Neil &lt;dneil@google.com&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
(cherry picked from commit 839da71f8907ac4434299db4353db31835c916df)
Reviewed-on: https://go-review.googlesource.com/c/go/+/714680
Reviewed-by: David Chase &lt;drchase@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.24] encoding/pem: properly decode strange PEM data</title>
<updated>2025-10-24T18:03:15Z</updated>
<author>
<name>Roland Shoemaker</name>
<email>roland@golang.org</email>
</author>
<published>2025-10-15T17:45:04Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=bbf8f423abc9f92f4c1c5d98281ed0b21107b00d'/>
<id>urn:sha1:bbf8f423abc9f92f4c1c5d98281ed0b21107b00d</id>
<content type='text'>
When the passed byte slice has leading garbage, properly handle ignoring
it and continuing to parse the slice until we find a valid block (or
nothing).

Fixes #75951

Change-Id: I07e937d9c754fd71b028b99450b48f57b4464457
Reviewed-on: https://go-review.googlesource.com/c/go/+/712140
Reviewed-by: Damien Neil &lt;dneil@google.com&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
(cherry picked from commit 09830901714d8b3a2cc5fb33e87a81886b21ea24)
Reviewed-on: https://go-review.googlesource.com/c/go/+/712641
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.24] net/url: allow IP-literals with IPv4-mapped IPv6 addresses</title>
<updated>2025-10-17T22:02:30Z</updated>
<author>
<name>Roland Shoemaker</name>
<email>roland@golang.org</email>
</author>
<published>2025-10-09T00:13:12Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=a216ddc295c3e983f78a7ff911ae20ca147b09b7'/>
<id>urn:sha1:a216ddc295c3e983f78a7ff911ae20ca147b09b7</id>
<content type='text'>
The security fix we applied in CL709857 was overly broad. It applied
rules from RFC 2732, which disallowed IPv4-mapped IPv6 addresses, but
these were later allowed in RFC 3986, which is the canonical URI syntax
RFC.

Revert the portion of CL709857 which restricted IPv4-mapped addresses,
and update the related tests.

Updates #75815
Fixes #75831

Change-Id: I3192f2275ad5c386f5c15006a6716bdb5282919d
Reviewed-on: https://go-review.googlesource.com/c/go/+/710375
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Reviewed-by: Ethan Lee &lt;ethanalee@google.com&gt;
Auto-Submit: Roland Shoemaker &lt;roland@golang.org&gt;
(cherry picked from commit 9db7e30bb42eed9912f5e7e9e3959f3b38879d5b)
Reviewed-on: https://go-review.googlesource.com/c/go/+/712142
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Auto-Submit: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.24] go1.24.9</title>
<updated>2025-10-13T21:14:38Z</updated>
<author>
<name>Gopher Robot</name>
<email>gobot@golang.org</email>
</author>
<published>2025-10-13T21:05:31Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=8e10ef451a1b6a1e8861ced1154e1c3265bfa01b'/>
<id>urn:sha1:8e10ef451a1b6a1e8861ced1154e1c3265bfa01b</id>
<content type='text'>
Change-Id: I6deccf317a5f19ca9ee2a2eaddf65203ecfeb665
Reviewed-on: https://go-review.googlesource.com/c/go/+/711461
Auto-Submit: Gopher Robot &lt;gobot@golang.org&gt;
Reviewed-by: Michael Pratt &lt;mpratt@google.com&gt;
TryBot-Bypass: Gopher Robot &lt;gobot@golang.org&gt;
Reviewed-by: Carlos Amedee &lt;carlos@golang.org&gt;
</content>
</entry>
<entry>
<title>[release-branch.go1.24] crypto/x509: rework fix for CVE-2025-58187</title>
<updated>2025-10-13T15:39:27Z</updated>
<author>
<name>Roland Shoemaker</name>
<email>roland@golang.org</email>
</author>
<published>2025-10-09T20:35:24Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go/commit/?id=ca6a5545ba18844a97c88a90a385eb6335bb7526'/>
<id>urn:sha1:ca6a5545ba18844a97c88a90a385eb6335bb7526</id>
<content type='text'>
In CL 709854 we enabled strict validation for a number of properties of
domain names (and their constraints). This caused significant breakage,
since we didn't previously disallow the creation of certificates which
contained these malformed domains.

Rollback a number of the properties we enforced, making domainNameValid
only enforce the same properties that domainToReverseLabels does. Since
this also undoes some of the DoS protections our initial fix enabled,
this change also adds caching of constraints in isValid (which perhaps
is the fix we should've initially chosen).

Updates #75835
Updates #75828
Fixes #75860

Change-Id: Ie6ca6b4f30e9b8a143692b64757f7bbf4671ed0e
Reviewed-on: https://go-review.googlesource.com/c/go/+/710735
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Reviewed-by: Damien Neil &lt;dneil@google.com&gt;
(cherry picked from commit 1cd71689f2ed8f07031a0cc58fc3586ca501839f)
Reviewed-on: https://go-review.googlesource.com/c/go/+/710879
Reviewed-by: Michael Pratt &lt;mpratt@google.com&gt;
Auto-Submit: Michael Pratt &lt;mpratt@google.com&gt;
</content>
</entry>
</feed>
