Commit graph

43 commits

Author SHA1 Message Date
bsiegert
ab9009427e Update Go to 1.6.3.
A security-related issue was recently reported in Go's net/http/cgi package and
net/http package when used in a CGI environment. Go 1.6.3 and Go 1.7rc2 contain
a fix for this issue.

Go versions 1.0-1.6.2 and 1.7rc1 are vulnerable to an input validation flaw in
the CGI components resulting in the HTTP_PROXY environment variable being set
by the incoming Proxy header. This environment variable was also used to set
the outgoing proxy, enabling an attacker to insert a proxy into outgoing
requests of a CGI program.

This is CVE-2016-5386 and was addressed by this change:
https://golang.org/cl/25010, tracked in this issue:
https://golang.org/issue/16405

The Go team would like to thank Dominic Scheirlinck for coordinating disclosure
of this issue across multiple languages and CGI environments. Read more about
"httpoxy" here: https://httpoxy.org/

Go 1.6.3 also adds support for macOS Sierra. See https://golang.org/issue/16354
for details.
2016-07-18 20:37:40 +00:00
wiz
2b0a009d0e Bump PKGREVISION for perl-5.24.0 for everything mentioning perl. 2016-07-09 06:37:46 +00:00
bsiegert
eb91133d34 Update Go to 1.6.1.
Two security-related issues were recently reported, and to address these issues
we have just released Go 1.6.1 and Go 1.5.4.

We recommend that all users update to one of these releases (if you're not sure
which, choose Go 1.6.1).

The issues addressed by these releases are:

On Windows, Go loads system DLLs by name with LoadLibrary, making it vulnerable
to DLL preloading attacks. For instance, if a user runs a Go executable from a
Downloads folder, malicious DLL files also downloaded to that folder could be
loaded into that executable.
This is CVE-2016-3958 and was addressed by this change: https://golang.org/cl/21428
Thanks to Taru Karttunen for identifying this issue.

Go's crypto libraries passed certain parameters unchecked to the underlying big
integer library, possibly leading to extremely long-running computations, which
in turn makes Go programs vulnerable to remote denial of service attacks.
Programs using HTTPS client certificates or the Go SSH server libraries are
both exposed to this vulnerability.
This is CVE-2016-3959 and was addressed by this change: https://golang.org/cl/21533
Thanks to David Wong for identifying this issue.
2016-04-13 07:12:00 +00:00
bsiegert
8afaa65266 Patch CVE-2016-3959 in Go. There will be a Go 1.6.1 release next week that
fixes this properly.
2016-04-08 20:00:02 +00:00
bsiegert
a238a56dd4 Update Go to 1.6.
The latest Go release, version 1.6, arrives six months after 1.5. Most of its
changes are in the implementation of the language, runtime, and libraries.
There are no changes to the language specification. As always, the release
maintains the Go 1 promise of compatibility. We expect almost all Go programs
to continue to compile and run as before.

The release adds new ports to Linux on 64-bit MIPS and Android on 32-bit x86;
defined and enforced rules for sharing Go pointers with C; transparent,
automatic support for HTTP/2; and a new mechanism for template reuse.

Full changelog at https://golang.org/doc/go1.6.
2016-02-23 20:12:25 +00:00
bsiegert
c422605863 Add the correct path for SSL certificates that mozilla-rootcerts uses.
PR pkg/50690.
2016-01-31 10:17:27 +00:00
fhajny
b6be94926f Update lang/go to 1.5.3.
This is a security-related release, it fixes CVE-2015-8618 that was
partically patched in 1.5.2nb1.

See full release notes for a description:

https://groups.google.com/d/msg/golang-announce/MEATuOi_ei4/JsndUuZwEAAJ
2016-01-16 09:43:44 +00:00
bsiegert
f07a25c3c0 Pull in https://golang.org/cl/17672, "math/big: fix carry propagation in
Int.Exp Montgomery code", to fix CVE-2015-8618.

From the oss-security posting that asked for a CVE:

"The Go open source project has received notification of an error in the
math/big library (https://golang.org/pkg/math/big/). The problem that was
identified is similar to CVE-2015-3193
<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3193>. The
vulnerability was introduced in the 1.5 release, and remains present in Go
1.5.1 and 1.5.2.

"A fix for the issue has been applied to the master branch of the Go repo
under CL 17672 <https://go-review.googlesource.com/#/c/17672/>. We will
also be releasing Go 1.5.3 to fix this vulnerability."

ok wiz@
2015-12-22 20:44:40 +00:00
bsiegert
3dce73223e Update Go to 1.5.2, original patch from Kamel Derouiche in PR pkg/50498.
go1.5.2 (released 2015/12/02) includes bug fixes to the compiler,
linker, and the mime/multipart, net, and runtime packages. See the Go
1.5.2 milestone on our issue tracker for details.

https://github.com/golang/go/issues?q=milestone%3AGo1.5.2
2015-12-10 20:04:54 +00:00
fhajny
e3d64585b1 Remove patch for a problem that was fixed in 1.5.1.
Clear PKGREVISION after PKGVERSION update.
2015-09-13 19:11:55 +00:00
fhajny
f9facf0aca Add support for the dup2 syscall on SunOS. Bump PKGREVISION. 2015-08-25 23:09:51 +00:00
fhajny
30aa367f71 Define test target for lang/go 2015-08-25 23:07:23 +00:00
wiz
31a9165c5b Fix interpreter path in more installed files.
Ignore another file's interpreter during build.
Bump PKGREVISION.
2015-08-22 23:49:13 +00:00
bsiegert
f6269e4136 Update go to 1.5.
This release now needs the previous one (lang/go14) to build.

The biggest developments in the implementation are:

* The compiler and runtime are now written entirely in Go (with a little
  assembler). C is no longer involved in the implementation, and so the
  C compiler that was once necessary for building the distribution is
  gone.
* The garbage collector is now concurrent and provides dramatically
  lower pause times by running, when possible, in parallel with other
  goroutines.
* By default, Go programs run with GOMAXPROCS set to the number of cores
  available; in prior releases it defaulted to 1.
* Support for internal packages is now provided for all repositories,
  not just the Go core.
* The go command now provides experimental support for "vendoring"
  external dependencies.
* A new go tool trace command supports fine-grained tracing of program
  execution.
* A new go doc command (distinct from godoc) is customized for
  command-line use.

Full release notes are at https://golang.org/doc/go1.5.
2015-08-22 10:51:20 +00:00
wiz
0982effce2 Recursive PKGREVISION bump for all packages mentioning 'perl',
having a PKGNAME of p5-*, or depending such a package,
for perl-5.22.0.
2015-06-12 10:48:20 +00:00
bsiegert
5b3cf9f413 Remove some files that no longer exist from the replace-interpreter list. 2015-05-03 15:32:02 +00:00
jperkin
a1dea38e5d Implement cgo support for illumos. Patches by Keith Wesolowski at Joyent.
Bump PKGREVISION.
2015-03-10 13:11:36 +00:00
tnn
2fe97d2274 drop DIST_SUBDIR 2015-02-22 13:28:30 +00:00
tnn
1228c689bc Upstream did distfile switcheroo. Update checksum to match the one listed
on https://golang.org/dl/. Diff to previous rel revealed nothing weird.
2015-02-04 22:57:46 +00:00
wiz
1c9d5ac401 Update to 1.4.1:
We've just released Go version 1.4.1, a minor point release.  This
release fixes bugs in linker and the log, runtime, and syscall
packages.
2015-01-16 11:27:03 +00:00
bsiegert
fa64415ac2 Remove special case for golang.org/x/tools from the go command.
We handle it differently in the go-tools package. While here, rename
GO_COMPILER to GOCHAR, which is the name upstream uses.

Bump PKGREVISION.
2014-12-31 11:40:14 +00:00
wiz
5fe43b2df2 Update to 1.4, ok bsiegert:
Today we announce Go 1.4, the fifth major stable release of Go,
arriving six months after our previous major release Go 1.3. It
contains a small language change, support for more operating systems
and processor architectures, and improvements to the tool chain
and libraries. As always, Go 1.4 keeps the promise of compatibility,
and almost everything will continue to compile and run without
change when moved to 1.4. For the full details, see the Go 1.4
release notes.

The most notable new feature in this release is official support
for Android. Using the support in the core and the libraries in
the golang.org/x/mobile repository, it is now possible to write
simple Android apps using only Go code. At this stage, the support
libraries are still nascent and under heavy development. Early
adopters should expect a bumpy ride, but we welcome the community
to get involved.

The language change is a tweak to the syntax of for-range loops.
You may now write "for range s {" to loop over each item from s,
without having to assign the value, loop index, or map key. See
the release notes for details.

The go command has a new subcommand, go generate, to automate the
running of tools to generate source code before compilation. For
example, it can be used to automate the generation of String methods
for typed constants using the new stringer tool. For more information,
see the design document.

Most programs will run about the same speed or slightly faster in
1.4 than in 1.3; some will be slightly slower. There are many
changes, making it hard to be precise about what to expect. See
the release notes for more discussion.

And, of course, there are many more improvements and bug fixes.

In case you missed it, a few weeks ago the sub-repositories were
moved to new locations. For example, the go.tools packages are now
imported from "golang.org/x/tools". See the announcement post for
details.

This release also coincides with the project's move from Mercurial
to Git (for source control), Rietveld to Gerrit (for code review),
and Google Code to Github (for issue tracking and wiki). The move
affects the core Go repository and its sub-repositories. You can
find the canonical Git repositories at go.googlesource.com, and
the issue tracker and wiki at the golang/go GitHub repo.
2014-12-12 09:41:40 +00:00
bsiegert
9c2fed0197 Add a separate Makefile for the version string plus GOARCH. To be used
by Go packages.
2014-11-18 20:39:11 +00:00
wiz
80ca574991 Update to 1.3.3:
go1.3.3 (released 2014/09/30) includes further bug fixes to cgo,
the runtime package, and the nacl port.
2014-10-12 14:51:03 +00:00
khorben
360914d754 Also look for the right path for the SSL certificate repository on NetBSD.
Fixes "go get code.google.com/p/..." for me, once security/mozilla-rootcerts
installed and configured (with the default settings).

Bumps PKGREVISION, since the package is modified.

ok bsiegert@
2014-10-11 16:41:47 +00:00
wiz
d6bad2788b Update to 1.3.2 for a security fix:
We've just released Go version 1.3.2, a minor point release.

This release includes bug fixes to cgo and the crypto/tls package.
    https://golang.org/doc/devel/release.html#go1.3.minor

The crpyto/tls fix addresses a security bug that affects programs
that use crypto/tls to implement a TLS server from Go 1.1 onwards.
If the server enables TLS client authentication using certificates
(this is rare) and explicitly sets SessionTicketsDisabled to true
in the tls.Config, then a malicious client can falsely assert
ownership of any client certificate it wishes. This issue was
discovered internally and there is no evidence of exploitation.
2014-09-26 13:54:28 +00:00
wiz
d2a2201f62 Update to 1.3.1:
This release includes bug fixes to the compiler and the runtime,
net, and crypto/rsa packages.

Ok bsiegert@
2014-08-17 15:17:42 +00:00
fhajny
346f9a7682 SunOS-*-i386 is not supported yet, don't bother building for now. 2014-07-30 12:04:20 +00:00
jperkin
3bde48d60c PLIST fixes for SunOS. 2014-07-07 16:44:18 +00:00
bsiegert
91c851381e Update go to 1.3. One of our patches was accepted upstream.
Note that this is a leaf package. schmonz says it is ok to update this
now.
2014-06-22 14:50:47 +00:00
joerg
263c37b981 Generalize the orig removal. 2014-06-14 16:20:45 +00:00
bsiegert
6cb9690664 Remove go/pkg/obj from the PLIST once and for all, and delete the directory
in do-install. The obj files are build artifacts.

Fixes breakage reported by wiz in private mail (I hope).
2014-05-31 13:06:47 +00:00
wiz
7eeb51b534 Bump for perl-5.20.0.
Do it for all packages that
* mention perl, or
* have a directory name starting with p5-*, or
* depend on a package starting with p5-
like last time, for 5.18, where this didn't lead to complaints.
Let me know if you have any this time.
2014-05-29 23:35:13 +00:00
bsiegert
90bc4cb1f6 Update Go to latest version 1.2.2.
go1.2.2 (released 2014/05/05) includes a security fix that affects the tour
binary included in the binary distributions (thanks to Guillaume T).
2014-05-27 18:56:53 +00:00
bsiegert
246fed7ee8 Apply patch from PR pkg/48834: introduce a GO_COMPILER variable that
contains the "arch character" (5, 6 or 8) and substitute it in PLIST.
Fixes installation on i386 and possibly evbarm.
2014-05-24 09:44:39 +00:00
wiz
a54c12cdb6 Fix packaging after patch was added. 2014-05-16 11:53:10 +00:00
christos
618cddf8e8 fix elf note computation 2014-05-15 19:35:49 +00:00
bsiegert
58b50a7ba2 Update go to 1.2.1, released today.
It contains the following fixes:

* runtime: fix crash in runtime.GoroutineProfile
* runtime: if traceback sees a breakpoint, don't change the PC
* runtime: fix data race in GC
* net: ignore some errors in windows Accept
* database/sql: Use all connections in pool
2014-03-03 15:41:12 +00:00
wiz
1dd0735e63 FETCH_USING should not be set in package Makefiles. 2014-01-05 14:55:09 +00:00
bsiegert
9c3f1aecce Apply a distribution patch to fix the handling of Unix domain sockets
on NetBSD/current. Bump PKGREVISION.
2014-01-04 11:35:48 +00:00
bsiegert
b8d8bd73fb Update go to 1.2.
Follow the example of OpenBSD ports and do not run the tests while building.
They are flaky under the Makefile harness for some reason.
2013-12-15 21:50:34 +00:00
bsiegert
328b115921 Update go to 1.1.2.
go1.1.2 (released 2013/08/13) includes fixes to the gc compiler and cgo,
and the bufio, runtime, syscall, and time packages. See the change
history for details. If you use package syscall's Getrlimit and
Setrlimit functions under Linux on the ARM or 386 architectures, please
note change 55ac276af5a7 that fixes issue 5949.

This is a leaf package, so it should be ok during the freeze.
2013-09-24 20:53:48 +00:00
wiz
5a6966d0fb Import go-1.1.1 as lang/go, packaged by Benny Siegert for wip.
The Go programming language is an open source project to make
programmers more productive.

Go is expressive, concise, clean, and efficient. Its concurrency
mechanisms make it easy to write programs that get the most out of
multicore and networked machines, while its novel type system enables
flexible and modular program construction. Go compiles quickly to
machine code yet has the convenience of garbage collection and the power
of run-time reflection. It's a fast, statically typed, compiled language
that feels like a dynamically typed, interpreted language.
2013-07-07 08:10:14 +00:00