Hi dear friends. first of all, thank you so much for your amazing operating system and forum.
This is my first post in this forum. Sorry if I did something wrong.
I tried to install go-1.17.1,1 on FreeBSD 12.2-RELEASE amd64 and updated and upgraded my system:
and tried to install go:
The installation was 100% complete, but this error message was displayed:
So I tried to compile it:
and failed again:
what should I do? I do Python, Ruby, ... programming without any problem. but I have this problem even in some stuff such as cargo (rust package manager).
I really appreciate any help...
This is my first post in this forum. Sorry if I did something wrong.
I tried to install go-1.17.1,1 on FreeBSD 12.2-RELEASE amd64 and updated and upgraded my system:
sudo pkg update && sudo pkg upgrade
and tried to install go:
sudo pkg install go
The installation was 100% complete, but this error message was displayed:
pkg: go-1.17.1,1 failed checksum from repository
So I tried to compile it:
sudo su
cd /usr/ports/lang/go/ && make -DBATCH install clean
and failed again:
Code:
===> go-1.15.8,1 has known vulnerabilities:
go-1.15.8,1 is vulnerable:
go -- multiple vulnerabilities
CVE: CVE-2021-41772
CVE: CVE-2021-41771
WWW: https://vuxml.FreeBSD.org/freebsd/930def19-3e05-11ec-9ba8-002324b2fba8.html
go -- net/http: ReadRequest can stack overflow due to recursion with very large headers
CVE: CVE-2021-31525
WWW: https://vuxml.FreeBSD.org/freebsd/7f242313-aea5-11eb-8151-67f74cf7c704.html
go -- encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader; archive/zip: panic when calling Reader.Open
CVE: CVE-2021-27919
CVE: CVE-2021-27918
WWW: https://vuxml.FreeBSD.org/freebsd/72709326-81f7-11eb-950a-00155d646401.html
go -- crypto/tls: clients can panic when provided a certificate of the wrong type for the negotiated parameters
CVE: CVE-2021-34558
WWW: https://vuxml.FreeBSD.org/freebsd/c365536d-e3cf-11eb-9d8d-b37b683944c2.html
go -- net/http: panic due to racy read of persistConn after handler panic
CVE: CVE-2021-36221
WWW: https://vuxml.FreeBSD.org/freebsd/880552c4-f63f-11eb-9d56-7186043316e9.html
go -- misc/wasm, cmd/link: do not let command line arguments overwrite global data
CVE: CVE-2021-38297
WWW: https://vuxml.FreeBSD.org/freebsd/4fce9635-28c0-11ec-9ba8-002324b2fba8.html
go -- multiple vulnerabilities
CVE: CVE-2021-33196
CVE: CVE-2021-33195
CVE: CVE-2021-33197
CVE: CVE-2021-33198
WWW: https://vuxml.FreeBSD.org/freebsd/079b3641-c4bd-11eb-a22a-693f0544ae52.html
go -- archive/zip: overflow in preallocation check can cause OOM panic
CVE: CVE-2021-39293
WWW: https://vuxml.FreeBSD.org/freebsd/4ea1082a-1259-11ec-b4fa-dd5a552bdd17.html
8 problem(s) in 1 installed package(s) found.
=> Please update your ports tree and try again.
=> Note: Vulnerable ports are marked as such even if there is no update available.
=> If you wish to ignore this vulnerability rebuild with 'make DISABLE_VULNERABILITIES=yes'
*** Error code 1
what should I do? I do Python, Ruby, ... programming without any problem. but I have this problem even in some stuff such as cargo (rust package manager).
I really appreciate any help...