update to go1.21.2, go1.20.9
go1.21.2 (released 2023-10-05) includes one security fixes to the cmd/go package, as well as bug fixes to the compiler, the go command, the linker, the runtime, and the runtime/metrics package. See the Go 1.21.2 milestone on our issue tracker for details: https://github.com/golang/go/issues?q=milestone%3AGo1.21.2+label%3ACherryPickApproved full diff: https://github.com/golang/go/compare/go1.21.1...go1.21.2 From the security mailing: [security] Go 1.21.2 and Go 1.20.9 are released Hello gophers, We have just released Go versions 1.21.2 and 1.20.9, minor point releases. These minor releases include 1 security fixes following the security policy: - cmd/go: line directives allows arbitrary execution during build "//line" directives can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compliation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploting this issue significantly more complex. This is CVE-2023-39323 and Go issue https://go.dev/issue/63211. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
This commit is contained in:
parent
8db0d39c68
commit
6b752b5362
2
.github/workflows/build-test-images.yml
vendored
2
.github/workflows/build-test-images.yml
vendored
@ -43,7 +43,7 @@ jobs:
|
|||||||
steps:
|
steps:
|
||||||
- uses: actions/setup-go@v3
|
- uses: actions/setup-go@v3
|
||||||
with:
|
with:
|
||||||
go-version: "1.21.1"
|
go-version: "1.21.2"
|
||||||
|
|
||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v3
|
||||||
with:
|
with:
|
||||||
|
4
.github/workflows/ci.yml
vendored
4
.github/workflows/ci.yml
vendored
@ -9,7 +9,7 @@ on:
|
|||||||
env:
|
env:
|
||||||
# Go version we currently use to build containerd across all CI.
|
# Go version we currently use to build containerd across all CI.
|
||||||
# Note: don't forget to update `Binaries` step, as it contains the matrix of all supported Go versions.
|
# Note: don't forget to update `Binaries` step, as it contains the matrix of all supported Go versions.
|
||||||
GO_VERSION: "1.21.1"
|
GO_VERSION: "1.21.2"
|
||||||
|
|
||||||
permissions: # added using https://github.com/step-security/secure-workflows
|
permissions: # added using https://github.com/step-security/secure-workflows
|
||||||
contents: read
|
contents: read
|
||||||
@ -209,7 +209,7 @@ jobs:
|
|||||||
strategy:
|
strategy:
|
||||||
matrix:
|
matrix:
|
||||||
os: [ubuntu-22.04, macos-12, windows-2019, windows-2022]
|
os: [ubuntu-22.04, macos-12, windows-2019, windows-2022]
|
||||||
go-version: ["1.20.8", "1.21.1"]
|
go-version: ["1.20.9", "1.21.2"]
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/setup-go@v4
|
- uses: actions/setup-go@v4
|
||||||
with:
|
with:
|
||||||
|
2
.github/workflows/codeql.yml
vendored
2
.github/workflows/codeql.yml
vendored
@ -34,7 +34,7 @@ jobs:
|
|||||||
|
|
||||||
- uses: actions/setup-go@v3
|
- uses: actions/setup-go@v3
|
||||||
with:
|
with:
|
||||||
go-version: 1.21.1
|
go-version: 1.21.2
|
||||||
|
|
||||||
# Initializes the CodeQL tools for scanning.
|
# Initializes the CodeQL tools for scanning.
|
||||||
- name: Initialize CodeQL
|
- name: Initialize CodeQL
|
||||||
|
2
.github/workflows/images.yml
vendored
2
.github/workflows/images.yml
vendored
@ -28,7 +28,7 @@ jobs:
|
|||||||
steps:
|
steps:
|
||||||
- uses: actions/setup-go@v3
|
- uses: actions/setup-go@v3
|
||||||
with:
|
with:
|
||||||
go-version: "1.21.1"
|
go-version: "1.21.2"
|
||||||
|
|
||||||
- uses: actions/checkout@v3
|
- uses: actions/checkout@v3
|
||||||
with:
|
with:
|
||||||
|
2
.github/workflows/nightly.yml
vendored
2
.github/workflows/nightly.yml
vendored
@ -7,7 +7,7 @@ on:
|
|||||||
- ".github/workflows/nightly.yml"
|
- ".github/workflows/nightly.yml"
|
||||||
|
|
||||||
env:
|
env:
|
||||||
GO_VERSION: "1.21.1"
|
GO_VERSION: "1.21.2"
|
||||||
|
|
||||||
permissions: # added using https://github.com/step-security/secure-workflows
|
permissions: # added using https://github.com/step-security/secure-workflows
|
||||||
contents: read
|
contents: read
|
||||||
|
2
.github/workflows/release.yml
vendored
2
.github/workflows/release.yml
vendored
@ -13,7 +13,7 @@ on:
|
|||||||
name: Release
|
name: Release
|
||||||
|
|
||||||
env:
|
env:
|
||||||
GO_VERSION: "1.21.1"
|
GO_VERSION: "1.21.2"
|
||||||
|
|
||||||
permissions: # added using https://github.com/step-security/secure-workflows
|
permissions: # added using https://github.com/step-security/secure-workflows
|
||||||
contents: read
|
contents: read
|
||||||
|
2
Vagrantfile
vendored
2
Vagrantfile
vendored
@ -104,7 +104,7 @@ EOF
|
|||||||
config.vm.provision "install-golang", type: "shell", run: "once" do |sh|
|
config.vm.provision "install-golang", type: "shell", run: "once" do |sh|
|
||||||
sh.upload_path = "/tmp/vagrant-install-golang"
|
sh.upload_path = "/tmp/vagrant-install-golang"
|
||||||
sh.env = {
|
sh.env = {
|
||||||
'GO_VERSION': ENV['GO_VERSION'] || "1.21.1",
|
'GO_VERSION': ENV['GO_VERSION'] || "1.21.2",
|
||||||
}
|
}
|
||||||
sh.inline = <<~SHELL
|
sh.inline = <<~SHELL
|
||||||
#!/usr/bin/env bash
|
#!/usr/bin/env bash
|
||||||
|
@ -29,7 +29,7 @@
|
|||||||
# docker run --privileged containerd-test
|
# docker run --privileged containerd-test
|
||||||
# ------------------------------------------------------------------------------
|
# ------------------------------------------------------------------------------
|
||||||
|
|
||||||
ARG GOLANG_VERSION=1.21.1
|
ARG GOLANG_VERSION=1.21.2
|
||||||
ARG GOLANG_IMAGE=golang
|
ARG GOLANG_IMAGE=golang
|
||||||
|
|
||||||
FROM ${GOLANG_IMAGE}:${GOLANG_VERSION} AS golang
|
FROM ${GOLANG_IMAGE}:${GOLANG_VERSION} AS golang
|
||||||
|
@ -43,11 +43,11 @@ go run main.go $SRC/containerd/images
|
|||||||
|
|
||||||
apt-get update && apt-get install -y wget
|
apt-get update && apt-get install -y wget
|
||||||
cd $SRC
|
cd $SRC
|
||||||
wget --quiet https://go.dev/dl/go1.21.1.linux-amd64.tar.gz
|
wget --quiet https://go.dev/dl/go1.21.2.linux-amd64.tar.gz
|
||||||
|
|
||||||
mkdir temp-go
|
mkdir temp-go
|
||||||
rm -rf /root/.go/*
|
rm -rf /root/.go/*
|
||||||
tar -C temp-go/ -xzf go1.21.1.linux-amd64.tar.gz
|
tar -C temp-go/ -xzf go1.21.2.linux-amd64.tar.gz
|
||||||
mv temp-go/go/* /root/.go/
|
mv temp-go/go/* /root/.go/
|
||||||
cd $SRC/containerd
|
cd $SRC/containerd
|
||||||
|
|
||||||
|
@ -5,7 +5,7 @@
|
|||||||
# lived test environment.
|
# lived test environment.
|
||||||
Set-MpPreference -DisableRealtimeMonitoring:$true
|
Set-MpPreference -DisableRealtimeMonitoring:$true
|
||||||
|
|
||||||
$PACKAGES= @{ mingw = "10.2.0"; git = ""; golang = "1.21.1"; make = ""; nssm = "" }
|
$PACKAGES= @{ mingw = "10.2.0"; git = ""; golang = "1.21.2"; make = ""; nssm = "" }
|
||||||
|
|
||||||
Write-Host "Downloading chocolatey package"
|
Write-Host "Downloading chocolatey package"
|
||||||
curl.exe -L "https://packages.chocolatey.org/chocolatey.0.10.15.nupkg" -o 'c:\choco.zip'
|
curl.exe -L "https://packages.chocolatey.org/chocolatey.0.10.15.nupkg" -o 'c:\choco.zip'
|
||||||
|
Loading…
Reference in New Issue
Block a user