Go programming language compiler and tools

Edit Package go1.18

Go is an expressive, concurrent, garbage collected systems programming language that is type safe and memory safe. It has pointers but no pointer arithmetic. Go has fast builds, clean syntax, garbage collection, methods for any type, and run-time reflection. It feels like a dynamic language but has the speed and safety of a static language.

Refresh
Refresh
Source Files
Filename Size Changed
README.SUSE 0000004904 4.79 KB
dont-force-gold-on-arm64.patch 0000001233 1.2 KB
gcc-go.patch 0000003046 2.97 KB
go-rpmlintrc 0000000496 496 Bytes
go.gdbinit 0000000073 73 Bytes
go1.18.3.src.tar.gz 0022838104 21.8 MB
go1.18.changes 0000025665 25.1 KB
go1.18.spec 0000013438 13.1 KB
llvm-89f7ccea6f6488c443655880229c54db1f180153.tar.xz 0002197644 2.1 MB
Revision 11 (latest revision is 23)
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 980420 from Jeff Kowalczyk's avatar Jeff Kowalczyk (jfkw) (revision 11)
- go1.18.3 (released 2022-06-01) includes security fixes to the
  crypto/rand, crypto/tls, os/exec, and path/filepath packages, as
  well as bug fixes to the compiler, and the crypto/tls and
  text/template/parse packages.
  Refs boo#1193742 go1.18 release tracking
  CVE-2022-30634 CVE-2022-30629 CVE-2022-30580 CVE-2022-29804
  * boo#1200134 go#52561 CVE-2022-30634
  * go#52933 crypto/rand: Read hangs when passed buffer larger than 1<<32 - 1
  * boo#1200135 go#52814 CVE-2022-30629
  * go#52833 crypto/tls: randomly generate ticket_age_add
  * boo#1200136 go#52574 CVE-2022-30580
  * go#53057 os/exec: Cmd.{Run,Start} should fail if Cmd.Path is unset
  * boo#1200137 go#52476 CVE-2022-29804
  * go#52479 path/filepath: Clean(.\c:) returns c: on Windows
  * go#51849 cmd/compile: crash on pointer conversion in call to mapaccess2
  * go#52242 cmd/compile: compiler crash on valid code
  * go#52286 cmd/compile: compiler crash with "Dictionary should have already been generated"
  * go#52791 crypto/tls: 500% increase in allocations from (*tls.Conn).Read in go 1.17
  * go#52878 text/template: break/continue require no whitespace around them
  * go#53043 misc/cgo/testsanitizers: occasional hangs in TestTSAN/tsan12
  * go#53115 misc/cgo/testsanitizers: deadlock in TestTSAN/tsan11 (forwarded request 980418 from jfkw)
Comments 1

Amax Chang's avatar

How about to add git to Requires in the .spec file due to go#51767?

openSUSE Build Service is sponsored by