[Bug 2103997] [NEW] [SRU] backport golang-1.23/1.23.7-1 to oracular/noble/jammy/focal

Shengjing Zhu 2103997 at bugs.launchpad.net
Mon Mar 24 09:39:50 UTC 2025


Public bug reported:

[Impact]

 * Current golang-1.22 version oracular/noble/jammy FTBFS due to tests using expired certifications (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1091497 https://github.com/golang/go/issues/71077 upstream fixed in golang 1.23.5).
 * MAAS Agent needs newer micro version of golang-1.23 because one of its dependency lxd library bumps the required version to 1.23.3 https://github.com/canonical/lxd/commit/7ce9339693ed949c62fc1a193c040b0c51aa0043
 * golang 1.23.3 - 1.23.7 contain several CVE (not high impact) fixes.
   + CVE-2024-45341: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints
   + CVE-2024-45336: net/http: sensitive headers incorrectly sent after cross-domain redirect
   + CVE-2025-22866: crypto/elliptic: timing sidechannel for P-256 on ppc64le
   + CVE-2025-22870: net/http, x/net/proxy, x/net/http/httpproxy: proxy bypass using IPv6 zone IDs


[Test Plan]

 * Install golang-1.23, and run `/usr/lib/go-1.23/bin/go version` to check the output. it should contains 1.23.7
 * For oracular, the golang-defaults is 1.23. We should rebuild parts of archive in PPA to check if they can still build. We can use all packages in main that build-deps on golang-1.23 or golang-defaults.
 * For noble, jammy, very few packages build-deps on golang-1.23, we should just rebuild them all in PPA to check if they can still build.
 * For focal, it's a new package. We can upload a new package to use golang-1.23 in PPA.

[Where problems could occur]

 * The micro releases of golang-1.23 may contain regressions and cause packages to FTBFS. But no regression reported so far in upstream issue tracker.
 * For focal, it's a new package, so it doesn't have impact on existing packages.

[Other Info]

 * upstream issue tracker for golang 1.23.3 to 1.23.7
   + 1.23.3 https://github.com/golang/go/milestone/375?closed=1
   + 1.23.4 https://github.com/golang/go/milestone/376?closed=1
   + 1.23.5 https://github.com/golang/go/milestone/379?closed=1
   + 1.23.6 https://github.com/golang/go/milestone/384?closed=1
   + 1.23.7 https://github.com/golang/go/milestone/386?closed=1

** Affects: golang-1.23 (Ubuntu)
     Importance: Undecided
         Status: New

** Affects: golang-1.23 (Ubuntu Focal)
     Importance: Undecided
         Status: New

** Affects: golang-1.23 (Ubuntu Jammy)
     Importance: Undecided
         Status: New

** Affects: golang-1.23 (Ubuntu Noble)
     Importance: Undecided
         Status: New

** Affects: golang-1.23 (Ubuntu Oracular)
     Importance: Undecided
         Status: New

** Also affects: golang-1.23 (Ubuntu Jammy)
   Importance: Undecided
       Status: New

** Also affects: golang-1.23 (Ubuntu Oracular)
   Importance: Undecided
       Status: New

** Also affects: golang-1.23 (Ubuntu Focal)
   Importance: Undecided
       Status: New

** Also affects: golang-1.23 (Ubuntu Noble)
   Importance: Undecided
       Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to golang-1.23 in Ubuntu.
https://bugs.launchpad.net/bugs/2103997

Title:
  [SRU] backport golang-1.23/1.23.7-1 to oracular/noble/jammy/focal

Status in golang-1.23 package in Ubuntu:
  New
Status in golang-1.23 source package in Focal:
  New
Status in golang-1.23 source package in Jammy:
  New
Status in golang-1.23 source package in Noble:
  New
Status in golang-1.23 source package in Oracular:
  New

Bug description:
  [Impact]

   * Current golang-1.22 version oracular/noble/jammy FTBFS due to tests using expired certifications (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1091497 https://github.com/golang/go/issues/71077 upstream fixed in golang 1.23.5).
   * MAAS Agent needs newer micro version of golang-1.23 because one of its dependency lxd library bumps the required version to 1.23.3 https://github.com/canonical/lxd/commit/7ce9339693ed949c62fc1a193c040b0c51aa0043
   * golang 1.23.3 - 1.23.7 contain several CVE (not high impact) fixes.
     + CVE-2024-45341: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints
     + CVE-2024-45336: net/http: sensitive headers incorrectly sent after cross-domain redirect
     + CVE-2025-22866: crypto/elliptic: timing sidechannel for P-256 on ppc64le
     + CVE-2025-22870: net/http, x/net/proxy, x/net/http/httpproxy: proxy bypass using IPv6 zone IDs

  
  [Test Plan]

   * Install golang-1.23, and run `/usr/lib/go-1.23/bin/go version` to check the output. it should contains 1.23.7
   * For oracular, the golang-defaults is 1.23. We should rebuild parts of archive in PPA to check if they can still build. We can use all packages in main that build-deps on golang-1.23 or golang-defaults.
   * For noble, jammy, very few packages build-deps on golang-1.23, we should just rebuild them all in PPA to check if they can still build.
   * For focal, it's a new package. We can upload a new package to use golang-1.23 in PPA.

  [Where problems could occur]

   * The micro releases of golang-1.23 may contain regressions and cause packages to FTBFS. But no regression reported so far in upstream issue tracker.
   * For focal, it's a new package, so it doesn't have impact on existing packages.

  [Other Info]

   * upstream issue tracker for golang 1.23.3 to 1.23.7
     + 1.23.3 https://github.com/golang/go/milestone/375?closed=1
     + 1.23.4 https://github.com/golang/go/milestone/376?closed=1
     + 1.23.5 https://github.com/golang/go/milestone/379?closed=1
     + 1.23.6 https://github.com/golang/go/milestone/384?closed=1
     + 1.23.7 https://github.com/golang/go/milestone/386?closed=1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/golang-1.23/+bug/2103997/+subscriptions




More information about the foundations-bugs mailing list