---------- Forwarded message ---------
From: <security-team-toolbox-bot@xxxxxxxxxxxxx>
Date: Thu, Nov 25, 2021 at 2:10 AM
Subject: apache2 contains outdated Ubuntu packages
To: <ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx>, <
sergio.durigan@xxxxxxxxxxxxx>
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r1481f93dccc3 (arm64; channels: 2.4-20.04_beta, 2.4-20.04_edge)
* libicu66: 5156-1
Revision r2af177c137cb (s390x; channels: 2.4-20.04_beta, 2.4-20.04_edge)
* libicu66: 5156-1
Revision r31b8e130476e (amd64; channels: 2.4-21.04_beta, 2.4-21.04_edge)
* libicu67: 5156-1
Revision r3cdd50c5b08e (ppc64le; channels: 2.4-20.04_beta, 2.4-20.04_edge)
* libicu66: 5156-1
Revision r83fa03301391 (amd64; channels: 2.4-20.04_beta, 2.4-20.04_edge)
* libicu66: 5156-1
Revision ra0049ed9451e (s390x; channels: 2.4-21.04_beta, 2.4-21.04_edge)
* libicu67: 5156-1
Revision rafa21ff2e473 (arm64; channels: 2.4-21.04_beta, 2.4-21.04_edge)
* libicu67: 5156-1
Revision rc6b677ac0f94 (ppc64le; channels: 2.4-21.04_beta, 2.4-21.04_edge)
* libicu67: 5156-1
Simply rebuilding the rock will pull in the new security updates and
resolve this. If your rock also contains vendored code, now might be a
good time to review it for any needed updates.
Thank you for your rock and for attending to this matter.