
go1.17.3 (released 2021-11-04) includes security fixes to the archive/zip and debug/macho packages, as well as bug fixes to the compiler, linker, runtime, the go command, the misc/wasm directory, and to the net/http and syscall packages. See the Go 1.17.3 milestone on our issue tracker for details. From the announcement e-mail: [security] Go 1.17.3 and Go 1.16.10 are released We have just released Go versions 1.17.3 and 1.16.10, minor point releases. These minor releases include two security fixes following the security policy: - archive/zip: don't panic on (*Reader).Open Reader.Open (the API implementing io/fs.FS introduced in Go 1.16) can be made to panic by an attacker providing either a crafted ZIP archive containing completely invalid names or an empty filename argument. Thank you to Colin Arnott, SiteHost and Noah Santschi-Cooney, Sourcegraph Code Intelligence Team for reporting this issue. This is CVE-2021-41772 and Go issue golang.org/issue/48085. - debug/macho: invalid dynamic symbol table command can cause panic Malformed binaries parsed using Open or OpenFat can cause a panic when calling ImportedSymbols, due to an out-of-bounds slice operation. Thanks to Burak Çarıkçı - Yunus Yıldırım (CT-Zer0 Crypttech) for reporting this issue. This is CVE-2021-41771 and Go issue golang.org/issue/48990. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
46 lines
1.5 KiB
PowerShell
46 lines
1.5 KiB
PowerShell
# Prepare windows environment for building and running containerd tests
|
|
|
|
$PACKAGES= @{ mingw = "10.2.0"; git = ""; golang = "1.17.3"; make = ""; nssm = "" }
|
|
|
|
write-host "Downloading chocolatey package"
|
|
curl.exe -L "https://packages.chocolatey.org/chocolatey.0.10.15.nupkg" -o 'c:\choco.zip'
|
|
Expand-Archive "c:\choco.zip" -DestinationPath "c:\choco"
|
|
|
|
write-host "Installing choco"
|
|
& "c:\choco\tools\chocolateyInstall.ps1"
|
|
|
|
write-host "Set choco.exe path."
|
|
$env:PATH+=";C:\ProgramData\chocolatey\bin"
|
|
|
|
write-host "Install necessary packages"
|
|
|
|
foreach ($package in $PACKAGES.Keys) {
|
|
$command = "choco.exe install $package --yes"
|
|
$version = $PACKAGES[$package]
|
|
if (-Not [string]::IsNullOrEmpty($version)) {
|
|
$command += " --version $version"
|
|
}
|
|
Invoke-Expression $command
|
|
}
|
|
|
|
write-host "Set up environment."
|
|
|
|
$path = ";c:\Program Files\Git\bin;c:\Program Files\Go\bin;c:\Users\azureuser\go\bin;c:\containerd\bin"
|
|
$env:PATH+=$path
|
|
|
|
write-host $env:PATH
|
|
|
|
[Environment]::SetEnvironmentVariable("PATH", $env:PATH, 'User')
|
|
|
|
# Prepare Log dir
|
|
mkdir c:\Logs
|
|
|
|
# Pull junit conversion tool
|
|
go get -u github.com/jstemmer/go-junit-report
|
|
|
|
# Get critctl tool. Used for cri-integration tests
|
|
$CRICTL_DOWNLOAD_URL="https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.21.0/crictl-v1.21.0-windows-amd64.tar.gz"
|
|
curl.exe -L $CRICTL_DOWNLOAD_URL -o c:\crictl.tar.gz
|
|
tar -xvf c:\crictl.tar.gz
|
|
mv crictl.exe c:\Users\azureuser\go\bin\crictl.exe # Move crictl somewhere in path
|