Commit graph

14 commits

Author SHA1 Message Date
jperkin
308d8b4664 go*: Disable SSP checks for similar reasons as RELRO. 2017-10-04 10:03:53 +00:00
bsiegert
06f4ab71ac Disable cgo, bump PKGREVISION.
"The bitrot will continue until morale improves."

Go 1.4 is only used as a bootstrap helper to compile a more recent Go.
However, cgo in 1.4 no longer works with current binutils.

Prodded by Thomas Orgis on the mailing list.
2017-09-02 17:15:00 +00:00
wiz
0fd193c72e Sprinkle CHECK_RELRO_SKIP on go packages.
go14 has no relro support AFAICT.

go-1.8.3 has if you use -buildmode=pie, but it claims it's not supported
on Linux.

Disable relro checking for go packages until bsiegert has time to
look at this.
2017-07-22 19:32:40 +00:00
wiz
8911ccdc82 Remove references to non-existing files. 2017-07-22 10:00:21 +00:00
tron
18e61521cf As this package doesn't install anything into "bin" we don't need to
create that directory.
2017-03-16 18:55:09 +00:00
bsiegert
a1a91c0a47 Backport fixes for compiling under macOS Sierra from
https://github.com/golang/go/issues/16352.
2016-10-04 18:45:22 +00:00
wiz
2b0a009d0e Bump PKGREVISION for perl-5.24.0 for everything mentioning perl. 2016-07-09 06:37:46 +00:00
bsiegert
404adc5544 Backport fix for new binutils to make go14 compile under NetBSD-current.
Patch from Ryo Onodera in PR pkg/50777.

The upstream bug report is https://github.com/golang/go/issues/13114.

Bump PKGREVISION.
2016-02-21 14:32:24 +00:00
bsiegert
1ab771e06e Pull in http://golang.org/cl/8261 to fix build on OpenIndiana,
PR pkg/50565.

ok wiz@
2015-12-21 20:20:02 +00:00
tnn
8fde422859 more REPLACE_BASH 2015-09-27 00:36:02 +00:00
bsiegert
2508868dbb Update go14 to 1.4.3. It fixes four security-related issues.
The issues were reported in Go's net/http package. They affect programs using
that package to proxy HTTP requests. We recommend that all users upgrade to Go
1.5, which fixes these issues. For users unable to upgrade to Go 1.5, we have
released version 1.4.3, which is based on Go 1.4.2 plus fixes for these issues.
Affected Go programs—those that use the net/http package as a proxy server—must
be recompiled with Go 1.5 or Go 1.4.3 to receive the fixes.

The CVE issue descriptions and fixes are linked below.

CVE-2015-5739
"Content Length" treated as valid header:
https://go-review.googlesource.com/#/c/11772/

CVE-2015-5740
Double content-length headers does not return 400 error:
https://go-review.googlesource.com/#/c/11810/

CVE-2015-5741
Additional hardening, not sending Content-Length w/Transfer-Encoding,
Closing connections:
https://go-review.googlesource.com/#/c/11810/
https://go-review.googlesource.com/#/c/12865/
https://go-review.googlesource.com/#/c/13148/

The Go team would like to thank Jed Denlea and Régis Leroy for their
contributions to this release. They have been awarded 1337 USD under the Google
Security Bounty program.
2015-09-26 17:37:01 +00:00
wiz
4e71c63196 Fix CHECK_FILES_SKIP patterns for new PREFIX.
No change to binary package, so no PKGREVISION bump.
2015-08-22 23:32:40 +00:00
bsiegert
21e2d84a56 Fix build on Darwin by adding go14 to INSTALLATION_DIRS. Darwin's pax
does not create the directory itself.
2015-08-22 10:46:33 +00:00
bsiegert
4f034c2357 Create lang/go14 as a copy of lang/go but which installs under
$PREFIX/go14.

Go 1.5 is going to be released soon, and it will depend on an existing
installation of Go 1.4 to compile. So let's provide one.
2015-07-31 14:46:25 +00:00