go1.21.2 (released 2023-10-05) includes one security fixes to the cmd/go package, as well as bug fixes to the compiler, the go command, the linker, the runtime, and the runtime/metrics package. See the Go 1.21.2 milestone on our issue tracker for details: https://github.com/golang/go/issues?q=milestone%3AGo1.21.2+label%3ACherryPickApproved full diff: https://github.com/golang/go/compare/go1.21.1...go1.21.2 From the security mailing: [security] Go 1.21.2 and Go 1.20.9 are released Hello gophers, We have just released Go versions 1.21.2 and 1.20.9, minor point releases. These minor releases include 1 security fixes following the security policy: - cmd/go: line directives allows arbitrary execution during build "//line" directives can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compliation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploting this issue significantly more complex. This is CVE-2023-39323 and Go issue https://go.dev/issue/63211. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
21 lines
669 B
Docker
21 lines
669 B
Docker
# syntax=docker/dockerfile:1
|
|
|
|
ARG GO_VERSION=1.21.2
|
|
|
|
FROM golang:${GO_VERSION}-alpine AS generated
|
|
ENV GOTOOLCHAIN=local
|
|
RUN go install github.com/dmcgowan/quicktls@master
|
|
WORKDIR /tmp/gencerts/notary
|
|
RUN --mount=type=bind,source=e2e/testdata/notary,target=/tmp/gencerts/notary,rw <<EOT
|
|
set -eu
|
|
mkdir -p ../notary-evil /out
|
|
quicktls -exp 87600h -org=Docker -with-san notary-server notaryserver evil-notary-server evilnotaryserver localhost 127.0.0.1
|
|
cat ca.pem >> notary-server.cert
|
|
mv ca.pem root-ca.cert
|
|
cp notary-server.cert notary-server.key root-ca.cert ../notary-evil
|
|
cp -r /tmp/gencerts/notary* /out/
|
|
EOT
|
|
|
|
FROM scratch
|
|
COPY --from=generated /out /
|