Skip to content

Commit aa11010

Browse files
committed
[release/1.6] update golang to 1.17.12
go1.17.12 (released 2022-07-12) includes security fixes to the compress/gzip, encoding/gob, encoding/xml, go/parser, io/fs, net/http, and path/filepath packages, as well as bug fixes to the compiler, the go command, the runtime, and the runtime/metrics package. See the Go 1.17.12 milestone on the issue tracker for details: https://github.com/golang/go/issues?q=milestone%3AGo1.17.12+label%3ACherryPickApproved This update addresses: CVE-2022-1705, CVE-2022-1962, CVE-2022-28131, CVE-2022-30630, CVE-2022-30631, CVE-2022-30632, CVE-2022-30633, CVE-2022-30635, and CVE-2022-32148. Full diff: golang/go@go1.17.11...go1.17.12 From the security announcement; https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE We have just released Go versions 1.18.4 and 1.17.12, minor point releases. These minor releases include 9 security fixes following the security policy: - net/http: improper sanitization of Transfer-Encoding header The HTTP/1 client accepted some invalid Transfer-Encoding headers as indicating a "chunked" encoding. This could potentially allow for request smuggling, but only if combined with an intermediate server that also improperly failed to reject the header as invalid. This is CVE-2022-1705 and https://go.dev/issue/53188. - When `httputil.ReverseProxy.ServeHTTP` was called with a `Request.Header` map containing a nil value for the X-Forwarded-For header, ReverseProxy would set the client IP as the value of the X-Forwarded-For header, contrary to its documentation. In the more usual case where a Director function set the X-Forwarded-For header value to nil, ReverseProxy would leave the header unmodified as expected. This is https://go.dev/issue/53423 and CVE-2022-32148. Thanks to Christian Mehlmauer for reporting this issue. - compress/gzip: stack exhaustion in Reader.Read Calling Reader.Read on an archive containing a large number of concatenated 0-length compressed files can cause a panic due to stack exhaustion. This is CVE-2022-30631 and Go issue https://go.dev/issue/53168. - encoding/xml: stack exhaustion in Unmarshal Calling Unmarshal on a XML document into a Go struct which has a nested field that uses the any field tag can cause a panic due to stack exhaustion. This is CVE-2022-30633 and Go issue https://go.dev/issue/53611. - encoding/xml: stack exhaustion in Decoder.Skip Calling Decoder.Skip when parsing a deeply nested XML document can cause a panic due to stack exhaustion. The Go Security team discovered this issue, and it was independently reported by Juho Nurminen of Mattermost. This is CVE-2022-28131 and Go issue https://go.dev/issue/53614. - encoding/gob: stack exhaustion in Decoder.Decode Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is CVE-2022-30635 and Go issue https://go.dev/issue/53615. - path/filepath: stack exhaustion in Glob Calling Glob on a path which contains a large number of path separators can cause a panic due to stack exhaustion. Thanks to Juho Nurminen of Mattermost for reporting this issue. This is CVE-2022-30632 and Go issue https://go.dev/issue/53416. - io/fs: stack exhaustion in Glob Calling Glob on a path which contains a large number of path separators can cause a panic due to stack exhaustion. This is CVE-2022-30630 and Go issue https://go.dev/issue/53415. - go/parser: stack exhaustion in all Parse* functions Calling any of the Parse functions on Go source code which contains deeply nested types or declarations can cause a panic due to stack exhaustion. Thanks to Juho Nurminen of Mattermost for reporting this issue. This is CVE-2022-1962 and Go issue https://go.dev/issue/53616. Signed-off-by: Sebastiaan van Stijn <[email protected]>
1 parent 4e92d8e commit aa11010

12 files changed

Lines changed: 22 additions & 22 deletions

File tree

.github/workflows/build-test-images.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ jobs:
3939
steps:
4040
- uses: actions/setup-go@v2
4141
with:
42-
go-version: '1.17.11'
42+
go-version: '1.17.12'
4343

4444
- uses: actions/checkout@v2
4545
with:

.github/workflows/ci.yml

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ jobs:
2020

2121
strategy:
2222
matrix:
23-
go-version: [1.17.11]
23+
go-version: [1.17.12]
2424
os: [ubuntu-18.04, macos-10.15, windows-2019]
2525

2626
steps:
@@ -46,7 +46,7 @@ jobs:
4646
steps:
4747
- uses: actions/setup-go@v2
4848
with:
49-
go-version: '1.17.11'
49+
go-version: '1.17.12'
5050

5151
- uses: actions/checkout@v2
5252
with:
@@ -78,7 +78,7 @@ jobs:
7878
steps:
7979
- uses: actions/setup-go@v2
8080
with:
81-
go-version: '1.17.11'
81+
go-version: '1.17.12'
8282

8383
- uses: actions/checkout@v2
8484
with:
@@ -110,7 +110,7 @@ jobs:
110110
steps:
111111
- uses: actions/setup-go@v2
112112
with:
113-
go-version: '1.17.11'
113+
go-version: '1.17.12'
114114
- uses: actions/checkout@v2
115115
- run: go install github.com/cpuguy83/go-md2man/[email protected]
116116
- run: make man
@@ -144,7 +144,7 @@ jobs:
144144
steps:
145145
- uses: actions/setup-go@v2
146146
with:
147-
go-version: '1.17.11'
147+
go-version: '1.17.12'
148148
- uses: actions/checkout@v2
149149
- run: |
150150
set -e -x
@@ -201,7 +201,7 @@ jobs:
201201
strategy:
202202
matrix:
203203
os: [ubuntu-18.04, macos-10.15, windows-2019, windows-2022]
204-
go-version: ['1.16.15', '1.17.11']
204+
go-version: ['1.16.15', '1.17.12']
205205

206206
steps:
207207
- uses: actions/setup-go@v2
@@ -248,7 +248,7 @@ jobs:
248248
steps:
249249
- uses: actions/setup-go@v2
250250
with:
251-
go-version: '1.17.11'
251+
go-version: '1.17.12'
252252

253253
- uses: actions/checkout@v2
254254
with:
@@ -338,7 +338,7 @@ jobs:
338338
steps:
339339
- uses: actions/setup-go@v2
340340
with:
341-
go-version: '1.17.11'
341+
go-version: '1.17.12'
342342

343343
- uses: actions/checkout@v2
344344

@@ -457,7 +457,7 @@ jobs:
457457
steps:
458458
- uses: actions/setup-go@v2
459459
with:
460-
go-version: '1.17.11'
460+
go-version: '1.17.12'
461461
- uses: actions/checkout@v2
462462
- run: sudo -E PATH=$PATH script/setup/install-gotestsum
463463
- name: Tests

.github/workflows/codeql.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ jobs:
2626

2727
- uses: actions/setup-go@v2
2828
with:
29-
go-version: 1.17.11
29+
go-version: 1.17.12
3030

3131
# Initializes the CodeQL tools for scanning.
3232
- name: Initialize CodeQL

.github/workflows/images.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ jobs:
2424
steps:
2525
- uses: actions/setup-go@v2
2626
with:
27-
go-version: '1.17.11'
27+
go-version: '1.17.12'
2828

2929
- uses: actions/checkout@v2
3030
with:

.github/workflows/nightly.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ jobs:
1818
steps:
1919
- uses: actions/setup-go@v2
2020
with:
21-
go-version: '1.17.11'
21+
go-version: '1.17.12'
2222

2323
- uses: actions/checkout@v2
2424
with:
@@ -135,7 +135,7 @@ jobs:
135135
steps:
136136
- uses: actions/setup-go@v2
137137
with:
138-
go-version: '1.17.11'
138+
go-version: '1.17.12'
139139

140140
- uses: actions/checkout@v2
141141
with:

.github/workflows/release.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ jobs:
6464
- name: Install Go
6565
uses: actions/setup-go@v2
6666
with:
67-
go-version: '1.17.11'
67+
go-version: '1.17.12'
6868
- name: Set env
6969
shell: bash
7070
env:
@@ -107,7 +107,7 @@ jobs:
107107
find ./releases/ -maxdepth 1 -type l | xargs rm
108108
working-directory: src/github.com/containerd/containerd
109109
env:
110-
GO_VERSION: '1.17.11'
110+
GO_VERSION: '1.17.12'
111111
PLATFORM: ${{ matrix.platform }}
112112
- name: Save Artifacts
113113
uses: actions/upload-artifact@v2

.zuul/playbooks/containerd-build/integration-test.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
become: yes
33
roles:
44
- role: config-golang
5-
go_version: '1.17.11'
5+
go_version: '1.17.12'
66
arch: arm64
77
tasks:
88
- name: Install pre-requisites

.zuul/playbooks/containerd-build/run.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
become: yes
33
roles:
44
- role: config-golang
5-
go_version: '1.17.11'
5+
go_version: '1.17.12'
66
arch: arm64
77
tasks:
88
- name: Build containerd

.zuul/playbooks/containerd-build/unit-test.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
become: yes
33
roles:
44
- role: config-golang
5-
go_version: '1.17.11'
5+
go_version: '1.17.12'
66
arch: arm64
77
tasks:
88
- name: Build and test containerd

Vagrantfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ EOF
9191
config.vm.provision "install-golang", type: "shell", run: "once" do |sh|
9292
sh.upload_path = "/tmp/vagrant-install-golang"
9393
sh.env = {
94-
'GO_VERSION': ENV['GO_VERSION'] || "1.17.11",
94+
'GO_VERSION': ENV['GO_VERSION'] || "1.17.12",
9595
}
9696
sh.inline = <<~SHELL
9797
#!/usr/bin/env bash

0 commit comments

Comments
 (0)