containerd/script/setup
Sebastiaan van Stijn 2122004525
update to go1.21.4, go1.20.11
go1.21.4 (released 2023-11-07) includes security fixes to the path/filepath
package, as well as bug fixes to the linker, the runtime, the compiler, and
the go/types, net/http, and runtime/cgo packages. See the Go 1.21.4 milestone
on our issue tracker for details:

- https://github.com/golang/go/issues?q=milestone%3AGo1.21.4+label%3ACherryPickApproved
- full diff: https://github.com/golang/go/compare/go1.21.3...go1.21.4

from the security mailing:

[security] Go 1.21.4 and Go 1.20.11 are released

Hello gophers,

We have just released Go versions 1.21.4 and 1.20.11, minor point releases.

These minor releases include 2 security fixes following the security policy:

- path/filepath: recognize `\??\` as a Root Local Device path prefix.

  On Windows, a path beginning with `\??\` is a Root Local Device path equivalent
  to a path beginning with `\\?\`. Paths with a `\??\` prefix may be used to
  access arbitrary locations on the system. For example, the path `\??\c:\x`
  is equivalent to the more common path c:\x.

  The filepath package did not recognize paths with a `\??\` prefix as special.

  Clean could convert a rooted path such as `\a\..\??\b` into
  the root local device path `\??\b`. It will now convert this
  path into `.\??\b`.

  `IsAbs` did not report paths beginning with `\??\` as absolute.
  It now does so.

  VolumeName now reports the `\??\` prefix as a volume name.

  `Join(`\`, `??`, `b`)` could convert a seemingly innocent
  sequence of path elements into the root local device path
  `\??\b`. It will now convert this to `\.\??\b`.

  This is CVE-2023-45283 and https://go.dev/issue/63713.

- path/filepath: recognize device names with trailing spaces and superscripts

  The `IsLocal` function did not correctly detect reserved names in some cases:

  - reserved names followed by spaces, such as "COM1 ".
  - "COM" or "LPT" followed by a superscript 1, 2, or 3.

  `IsLocal` now correctly reports these names as non-local.

  This is CVE-2023-45284 and https://go.dev/issue/63713.

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2023-12-05 23:31:28 +01:00
..
config-containerd Update Vagrantfile for testing SELinux 2020-08-10 01:55:44 -07:00
config-selinux scripts: add missing quotes, and minor linting issues 2021-08-03 17:23:18 +02:00
critools-version Update critools to 1.28.0 2023-08-24 11:15:24 -04:00
crun-version Bump crun to 1.9 2023-09-14 11:03:15 +02:00
enable_docker_tls_on_windows.ps1 Add image build workflow 2021-11-25 09:26:17 +00:00
enable_ssh_windows.ps1 Add CI periodic Windows Jobs. 2021-04-20 17:18:46 +03:00
imgcrypt-version just release ctd-decoder not ctr-enc 2021-05-13 15:56:45 -05:00
install-cni make repositories of install dependencies configurable 2023-08-28 18:43:41 +05:30
install-cni-windows Add arm64 to releases 2021-11-11 20:00:34 +00:00
install-critools make repositories of install dependencies configurable 2023-08-28 18:43:41 +05:30
install-dev-tools Bump up golangci-lint to v1.54.2 2023-10-03 21:57:07 +09:00
install-failpoint-binaries *: add runc-fp as runc wrapper to inject failpoint 2023-10-02 17:44:41 +00:00
install-gotestsum gotestsum match go version 1.19 2022-11-17 20:42:22 +08:00
install-imgcrypt just release ctd-decoder not ctr-enc 2021-05-13 15:56:45 -05:00
install-protobuf Add Linux arm64 arch to install-protobuf script 2023-02-27 09:14:57 -08:00
install-runc make repositories of install dependencies configurable 2023-08-28 18:43:41 +05:30
install-runhcs-shim Windows: Supply windows shim version via file 2023-08-28 11:55:55 -07:00
install-seccomp Bump seccomp version to be the same as one in runc repo 2023-05-16 09:33:26 -04:00
install-teststat CI: Output a summary using GITHUB_SUMMARY 2022-09-14 23:30:47 +00:00
prepare_env_windows.ps1 update to go1.21.4, go1.20.11 2023-12-05 23:31:28 +01:00
prepare_windows_docker_helper.ps1 Add image build workflow 2021-11-25 09:26:17 +00:00
runc-version update runc binary to v1.1.10 2023-11-13 16:03:29 +01:00
runhcs-version Update hcsshim tag in runhcs-version script 2023-08-31 10:07:14 -07:00