Bugzilla – Bug 1216006
VUL-0: cni,cni-plugins: go1.19 is EOL
Last modified: 2023-10-19 08:54:53 UTC
cni and cni-plugins are curerently built against go.19 please fix that they are built against go1.20 and go1.21 +++ This bug was initially created as a clone of Bug #1215611 +++ as go1.19 is EOL, this is the tracker bug to link bugs referencing go packagds still linking go1.19.
BuildRequires in cni: SUSE:ALP:Source:Standard:1.0 golang(API) >= 1.14 SUSE:SLE-15-SP5:Update golang(API) >= 1.14 SUSE:SLE-15-SP1:Update <no golang API build requirement> BuildRequires in cni-plugins: SUSE:ALP:Source:Standard:1.0 golang(API) >= 1.15 SUSE:SLE-15-SP5:Update golang(API) >= 1.15 SUSE:SLE-15-SP1:Update golang(API) >= 1.11
basically I think only a rebuild is needed. My logic that detect rebuild-only would work, does not work for GA packages. I will just queue rebuilds when I get to it.
i added the bug reference to the current rebuiold incidents.
SUSE-SU-2023:4076-1: An update that has two security fixes can now be installed. Category: security (important) Bug References: 1212475, 1216006 Sources used: openSUSE Leap 15.5 (src): cni-1.1.2-150500.3.2.1 SUSE Linux Enterprise Micro 5.5 (src): cni-1.1.2-150500.3.2.1 Containers Module 15-SP5 (src): cni-1.1.2-150500.3.2.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4075-1: An update that has two security fixes can now be installed. Category: security (important) Bug References: 1212475, 1216006 Sources used: openSUSE Leap 15.5 (src): cni-plugins-1.1.1-150500.3.2.1 SUSE Linux Enterprise Micro 5.5 (src): cni-plugins-1.1.1-150500.3.2.1 Containers Module 15-SP5 (src): cni-plugins-1.1.1-150500.3.2.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4127-1: An update that has two security fixes can now be installed. Category: security (important) Bug References: 1212475, 1216006 Sources used: SUSE Linux Enterprise Micro for Rancher 5.3 (src): cni-plugins-0.8.6-150100.3.20.1 SUSE Linux Enterprise Micro 5.3 (src): cni-plugins-0.8.6-150100.3.20.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): cni-plugins-0.8.6-150100.3.20.1 SUSE Linux Enterprise Micro 5.4 (src): cni-plugins-0.8.6-150100.3.20.1 Containers Module 15-SP4 (src): cni-plugins-0.8.6-150100.3.20.1 Public Cloud Module 15-SP1 (src): cni-plugins-0.8.6-150100.3.20.1 Public Cloud Module 15-SP2 (src): cni-plugins-0.8.6-150100.3.20.1 SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): cni-plugins-0.8.6-150100.3.20.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): cni-plugins-0.8.6-150100.3.20.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): cni-plugins-0.8.6-150100.3.20.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): cni-plugins-0.8.6-150100.3.20.1 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): cni-plugins-0.8.6-150100.3.20.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): cni-plugins-0.8.6-150100.3.20.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): cni-plugins-0.8.6-150100.3.20.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): cni-plugins-0.8.6-150100.3.20.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): cni-plugins-0.8.6-150100.3.20.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): cni-plugins-0.8.6-150100.3.20.1 SUSE Enterprise Storage 7.1 (src): cni-plugins-0.8.6-150100.3.20.1 SUSE CaaS Platform 4.0 (src): cni-plugins-0.8.6-150100.3.20.1 SUSE Linux Enterprise Micro 5.1 (src): cni-plugins-0.8.6-150100.3.20.1 SUSE Linux Enterprise Micro 5.2 (src): cni-plugins-0.8.6-150100.3.20.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): cni-plugins-0.8.6-150100.3.20.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4126-1: An update that has two security fixes can now be installed. Category: security (important) Bug References: 1212475, 1216006 Sources used: SUSE Linux Enterprise Micro for Rancher 5.3 (src): cni-0.7.1-150100.3.16.1 SUSE Linux Enterprise Micro 5.3 (src): cni-0.7.1-150100.3.16.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): cni-0.7.1-150100.3.16.1 SUSE Linux Enterprise Micro 5.4 (src): cni-0.7.1-150100.3.16.1 Containers Module 15-SP4 (src): cni-0.7.1-150100.3.16.1 Public Cloud Module 15-SP1 (src): cni-0.7.1-150100.3.16.1 Public Cloud Module 15-SP2 (src): cni-0.7.1-150100.3.16.1 SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): cni-0.7.1-150100.3.16.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): cni-0.7.1-150100.3.16.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): cni-0.7.1-150100.3.16.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): cni-0.7.1-150100.3.16.1 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): cni-0.7.1-150100.3.16.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): cni-0.7.1-150100.3.16.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): cni-0.7.1-150100.3.16.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): cni-0.7.1-150100.3.16.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): cni-0.7.1-150100.3.16.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): cni-0.7.1-150100.3.16.1 SUSE Enterprise Storage 7.1 (src): cni-0.7.1-150100.3.16.1 SUSE CaaS Platform 4.0 (src): cni-0.7.1-150100.3.16.1 SUSE Linux Enterprise Micro 5.1 (src): cni-0.7.1-150100.3.16.1 SUSE Linux Enterprise Micro 5.2 (src): cni-0.7.1-150100.3.16.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): cni-0.7.1-150100.3.16.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.