Package: golang-1.15 / 1.15.15-1~deb11u4
Metadata
Package | Version | Patches format |
---|---|---|
golang-1.15 | 1.15.15-1~deb11u4 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
0001 Disable test for UserHomeDir.patch | (download) |
src/os/os_test.go |
2 2 + 0 - 0 ! |
disable test for userhomedir. On Debian buildds, the user home dir does not exist, so this test fails. |
0002 Fix Lintian warnings about wrong interpreter path.patch | (download) |
src/syscall/mksyscall.pl |
2 1 + 1 - 0 ! |
fix lintian warnings about wrong interpreter path The command used for this change is as follows: grep -rH "/usr/bin/env perl" * | cut -d: -f1 | xargs -n1 sed -i -e "s,/usr/bin/env perl,/usr/bin/perl," |
0003 cmd go cmd cgo pass mfp32 and mhard soft float to MI.patch | (download) |
src/cmd/cgo/gcc.go |
12 10 + 2 - 0 ! |
cmd/go, cmd/cgo: pass -mfp32 and -mhard/soft-float to mips gcc For mips32 currently, we are using FP32, while the gcc may be FPXX, which may generate .MIPS.abiflags and .gnu.attributes section with value as FPXX. So the kernel will treat the exe as FPXX, and may choose to use FR=1 FPU mode for it. Currently, in Go, we use 2 lwc1 to load both half of a double value to a pair of even-odd FPR. This behavior can only work with FR=0 mode. In FR=1 mode, all of 32 FPR are 64bit. If we lwc1 the high-half of a double value to an odd FPR, and try to use the previous even FPR to compute, the real high-half of even FPR will be unpredicatable. We set -mfp32 to force the gcc generate FP32 code and section value. More details about FP32/FPXX/FP64 are explained in: https://web.archive.org/web/20180828210612/https://dmz-portal.mips.com/wiki/MIPS_O32_ABI_-_FR0_and_FR1_Interlinking When GOMIPS/GOMIPS64 is set as softfloat, we should also pass -msoft-float to gcc. Here we also add -mno-odd-spreg option, since Loongson's CPU cannot use odd-number FR in FR=0 mode. Fixes #39435 |
0004 cmd dist fix build failure of misc cgo test on arm64.patch | (download) |
misc/cgo/test/issue7978.go |
117 117 + 0 - 0 ! |
cmd/dist: fix build failure of misc/cgo/test on arm64 Test7978 of misc/cgo/test fails in 'dist test' on arm64 if the C compiler is of GCC-9.4 or above and its 'outline atomics' feature is enabled, since the internal linking hasn't yet supported "__attribute__((constructor))" and also mis-handles hidden visibility. Two changes are made for 'misc/cgo/test' to fix the issue: 1. passing "-tags=internal" for the internal linking PIE case. 2. skipping Test7978 on arm64 for the internal linking cases. This CL fixes 'dist test' failure only, user is expected to pass the option '-mno-outline-atomics' via CGO_CFLAGS if running into the same problem when building cgo program using internal linking. Updates #39466 |
0005 cmd dist increase default timeout scale for arm.patch | (download) |
src/cmd/dist/test.go |
2 1 + 1 - 0 ! |
[patch] cmd/dist: increase default timeout scale for arm |
0006 skip userns test in schroot as well.patch | (download) |
src/syscall/exec_linux_test.go |
7 7 + 0 - 0 ! |
skip userns test in schroot as well When schroot is using overlayfs, it fails to detect it as chroot. |
0007 CVE 2021 39293.patch | (download) |
src/archive/zip/reader.go |
2 1 + 1 - 0 ! |
cve-2021-39293 |
0008 CVE 2021 38297.patch | (download) |
misc/wasm/wasm_exec.js |
7 7 + 0 - 0 ! |
cve-2021-38297 |
0009 CVE 2021 41771.patch | (download) |
src/debug/macho/file.go |
9 9 + 0 - 0 ! |
cve-2021-41771 |
0010 CVE 2021 44716.patch | (download) |
src/net/http/h2_bundle.go |
10 9 + 1 - 0 ! |
cve-2021-44716 |
0011 CVE 2021 44717.patch | (download) |
src/syscall/exec_unix.go |
20 6 + 14 - 0 ! |
cve-2021-44717 |
0012 CVE 2022 23806.patch | (download) |
src/crypto/elliptic/elliptic.go |
5 5 + 0 - 0 ! |
cve-2022-23806 |
0013 CVE 2022 23772.patch | (download) |
src/math/big/ratconv.go |
5 5 + 0 - 0 ! |
cve-2022-23772 |
0014 CVE 2022 23773.patch | (download) |
src/cmd/go/internal/modfetch/coderepo.go |
215 106 + 109 - 0 ! |
cve-2022-23773 |
0015 CVE 2022 24921.patch | (download) |
src/regexp/syntax/parse.go |
72 70 + 2 - 0 ! |
cve-2022-24921 |