containerd/script/setup
Sebastiaan van Stijn 157dff2812
update to go1.20.7, go1.19.12
Includes a fix for CVE-2023-29409

go1.20.7 (released 2023-08-01) includes a security fix to the crypto/tls
package, as well as bug fixes to the assembler and the compiler. See the
Go 1.20.7 milestone on our issue tracker for details:

- https://github.com/golang/go/issues?q=milestone%3AGo1.20.7+label%3ACherryPickApproved
- full diff: https://github.com/golang/go/compare/go1.20.6...go1.20.7

go1.19.12 (released 2023-08-01) includes a security fix to the crypto/tls
package, as well as bug fixes to the assembler and the compiler. See the
Go 1.19.12 milestone on our issue tracker for details.

- https://github.com/golang/go/issues?q=milestone%3AGo1.19.12+label%3ACherryPickApproved
- full diff: https://github.com/golang/go/compare/go1.19.11...go1.19.12

From the mailing list announcement:

[security] Go 1.20.7 and Go 1.19.12 are released

Hello gophers,

We have just released Go versions 1.20.7 and 1.19.12, minor point releases.

These minor releases include 1 security fixes following the security policy:

- crypto/tls: restrict RSA keys in certificates to <= 8192 bits

  Extremely large RSA keys in certificate chains can cause a client/server
  to expend significant CPU time verifying signatures. Limit this by
  restricting the size of RSA keys transmitted during handshakes to <=
  8192 bits.

  Based on a survey of publicly trusted RSA keys, there are currently only
  three certificates in circulation with keys larger than this, and all
  three appear to be test certificates that are not actively deployed. It
  is possible there are larger keys in use in private PKIs, but we target
  the web PKI, so causing breakage here in the interests of increasing the
  default safety of users of crypto/tls seems reasonable.

  Thanks to Mateusz Poliwczak for reporting this issue.

View the release notes for more information:
https://go.dev/doc/devel/release#go1.20.7

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2023-08-01 23:57:32 +02:00
..
config-containerd Update Vagrantfile for testing SELinux 2020-08-10 01:55:44 -07:00
config-selinux scripts: add missing quotes, and minor linting issues 2021-08-03 17:23:18 +02:00
critools-version move to CRI-TOOLS v1.27.0 2023-05-03 18:14:01 -05:00
crun-version CI: bump up crun to 1.8.3 2023-04-03 14:30:15 +09:00
enable_docker_tls_on_windows.ps1 Add image build workflow 2021-11-25 09:26:17 +00:00
enable_ssh_windows.ps1 Add CI periodic Windows Jobs. 2021-04-20 17:18:46 +03:00
imgcrypt-version just release ctd-decoder not ctr-enc 2021-05-13 15:56:45 -05:00
install-cni fix install cni script 2022-10-10 10:29:20 +08:00
install-cni-windows Add arm64 to releases 2021-11-11 20:00:34 +00:00
install-critools Update ginkgo to match cri-tools' version 2023-06-28 13:14:22 +00:00
install-dev-tools Bump up golangci-lint to v1.52.2 2023-05-09 15:07:55 +09:00
install-failpoint-binaries integration: Add injected failpoint testing for RunPodSandbox 2022-07-22 23:25:40 +08:00
install-gotestsum gotestsum match go version 1.19 2022-11-17 20:42:22 +08:00
install-imgcrypt just release ctd-decoder not ctr-enc 2021-05-13 15:56:45 -05:00
install-protobuf Add Linux arm64 arch to install-protobuf script 2023-02-27 09:14:57 -08:00
install-runc Rework permission handling in scripts 2022-08-05 17:05:36 -07:00
install-runhcs-shim Removing end of line for last line 2023-02-01 20:44:23 +05:30
install-seccomp Bump seccomp version to be the same as one in runc repo 2023-05-16 09:33:26 -04:00
install-teststat CI: Output a summary using GITHUB_SUMMARY 2022-09-14 23:30:47 +00:00
prepare_env_windows.ps1 update to go1.20.7, go1.19.12 2023-08-01 23:57:32 +02:00
prepare_windows_docker_helper.ps1 Add image build workflow 2021-11-25 09:26:17 +00:00
runc-version update runc binary to v1.1.8 2023-07-19 18:16:06 +02:00