← Back to team overview

ubuntu-docker-images team mailing list archive

Re: postgres contains outdated Ubuntu packages

 

On Wednesday, March 02 2022, security-team-toolbox-bot@xxxxxxxxxxxxx wrote:

> A scan of this rock shows that it was built with packages from the Ubuntu
> archive that have since received security updates. The following lists new
> USNs for affected binary packages in each rock revision:
>
> Revision r2e08047fd6b4 (s390x; channels: 12-20.04_edge, 12-20.04_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>  * locales: 5310-1
>
> Revision r5252605f3628 (arm64; channels: edge, 13-21.10_edge, latest, 13-21.10_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>  * locales: 5310-1
>
> Revision r537e43b4405b (ppc64le; channels: edge, 13-21.10_edge, latest, 13-21.10_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>  * locales: 5310-1
>
> Revision r63430cbc87a8 (arm64; channels: 12-20.04_edge, 12-20.04_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>  * locales: 5310-1
>
> Revision r90611379649d (amd64; channels: 12-20.04_edge, 12-20.04_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>  * locales: 5310-1
>
> Revision ra0d846819c43 (ppc64le; channels: 12-20.04_edge, 12-20.04_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>  * locales: 5310-1
>
> Revision rd2042f85fe88 (s390x; channels: edge, 13-21.10_edge, latest, 13-21.10_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>  * locales: 5310-1
>
> Revision rfb8a419f073a (amd64; channels: edge, 13-21.10_edge, latest, 13-21.10_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>  * locales: 5310-1
>
> Simply rebuilding the rock will pull in the new security updates and
> resolve this. If your rock also contains vendored code, now might be a
> good time to review it for any needed updates.
>
> Thank you for your rock and for attending to this matter.
>
> References:
>  * https://ubuntu.com/security/notices/USN-5310-1/

On Wednesday, March 02 2022, security-team-toolbox-bot@xxxxxxxxxxxxx wrote:

> A scan of this rock shows that it was built with packages from the Ubuntu
> archive that have since received security updates. The following lists new
> USNs for affected binary packages in each rock revision:
>
> Revision r31f0e5271742 (s390x; channels: edge, 8.0-21.10_beta, latest, 8.0-21.10_edge)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision r5e13619c74c5 (s390x; channels: 8.0-20.04_beta, 8.0-20.04_edge)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision r63d6a9f67ad7 (ppc64le; channels: edge, 8.0-21.10_beta, latest, 8.0-21.10_edge)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision r96c14459967d (amd64; channels: 8.0-20.04_beta, 8.0-20.04_edge)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision rb02494bd553c (arm64; channels: 8.0-20.04_beta, 8.0-20.04_edge)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision rc622b90657f1 (arm64; channels: edge, 8.0-21.10_beta, latest, 8.0-21.10_edge)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision rcfdee6c29934 (ppc64le; channels: 8.0-20.04_beta, 8.0-20.04_edge)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision rd4a2226f64ee (amd64; channels: edge, 8.0-21.10_beta, latest, 8.0-21.10_edge)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Simply rebuilding the rock will pull in the new security updates and
> resolve this. If your rock also contains vendored code, now might be a
> good time to review it for any needed updates.
>
> Thank you for your rock and for attending to this matter.
>
> References:
>  * https://ubuntu.com/security/notices/USN-5310-1/

On Wednesday, March 02 2022, security-team-toolbox-bot@xxxxxxxxxxxxx wrote:

> A scan of this rock shows that it was built with packages from the Ubuntu
> archive that have since received security updates. The following lists new
> USNs for affected binary packages in each rock revision:
>
> Revision r14274d861a42 (ppc64le; channels: 1.5-20.04_beta, 1.5-20.04_edge)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision r357996c514bb (ppc64le; channels: edge, 1.6-21.10_edge, latest, 1.6-21.10_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision r3b732acbe7d9 (s390x; channels: edge, 1.6-21.10_edge, latest, 1.6-21.10_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision r7ec7be1ecfbc (s390x; channels: 1.5-20.04_beta, 1.5-20.04_edge)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision ra964e25559fd (amd64; channels: edge, 1.6-21.10_edge, latest, 1.6-21.10_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision rd5919302bf34 (amd64; channels: 1.5-20.04_beta, 1.5-20.04_edge)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision rd6e184e2fe3f (arm64; channels: edge, 1.6-21.10_edge, latest, 1.6-21.10_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision rece49be59fe2 (arm64; channels: 1.5-20.04_beta, 1.5-20.04_edge)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Simply rebuilding the rock will pull in the new security updates and
> resolve this. If your rock also contains vendored code, now might be a
> good time to review it for any needed updates.
>
> Thank you for your rock and for attending to this matter.
>
> References:
>  * https://ubuntu.com/security/notices/USN-5310-1/

On Wednesday, March 02 2022, security-team-toolbox-bot@xxxxxxxxxxxxx wrote:

> A scan of this rock shows that it was built with packages from the Ubuntu
> archive that have since received security updates. The following lists new
> USNs for affected binary packages in each rock revision:
>
> Revision r0fddcf589af1 (s390x; channels: edge, latest, 2.4-21.10_edge, 2.4-21.10_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision r1fdf5da3f4f9 (s390x; channels: 2.4-20.04_beta, 2.4-20.04_edge)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision r2391085e42d1 (ppc64le; channels: 2.4-20.04_beta, 2.4-20.04_edge)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision r2d4f6d1c277b (arm64; channels: 2.4-20.04_beta, 2.4-20.04_edge)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision rd05dc11bad01 (ppc64le; channels: edge, latest, 2.4-21.10_edge, 2.4-21.10_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision rd5c20a306d8d (amd64; channels: edge, latest, 2.4-21.10_edge, 2.4-21.10_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision rda6d3ade8d4e (arm64; channels: edge, latest, 2.4-21.10_edge, 2.4-21.10_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision re1bfe550f4fc (amd64; channels: 2.4-20.04_beta, 2.4-20.04_edge)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Simply rebuilding the rock will pull in the new security updates and
> resolve this. If your rock also contains vendored code, now might be a
> good time to review it for any needed updates.
>
> Thank you for your rock and for attending to this matter.
>
> References:
>  * https://ubuntu.com/security/notices/USN-5310-1/

On Wednesday, March 02 2022, security-team-toolbox-bot@xxxxxxxxxxxxx wrote:

> A scan of this rock shows that it was built with packages from the Ubuntu
> archive that have since received security updates. The following lists new
> USNs for affected binary packages in each rock revision:
>
> Revision r1d82f0f6f97d (s390x; channels: 1.18-20.04_edge, 1.18-20.04_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision r205bb74c7cc8 (amd64; channels: 1.18-20.04_edge, 1.18-20.04_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision r7a2b2cbe0cf3 (ppc64le; channels: edge, 1.18-21.10_edge, latest, 1.18-21.10_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision rb521366733aa (arm64; channels: 1.18-20.04_edge, 1.18-20.04_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision rc756bcd125a7 (s390x; channels: edge, 1.18-21.10_edge, latest, 1.18-21.10_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision rda6c823df28c (amd64; channels: edge, 1.18-21.10_edge, latest, 1.18-21.10_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision rf7f79a51a74e (arm64; channels: edge, 1.18-21.10_edge, latest, 1.18-21.10_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Revision rf862fc4271de (ppc64le; channels: 1.18-20.04_edge, 1.18-20.04_beta)
>  * libc-bin: 5310-1
>  * libc6: 5310-1
>
> Simply rebuilding the rock will pull in the new security updates and
> resolve this. If your rock also contains vendored code, now might be a
> good time to review it for any needed updates.
>
> Thank you for your rock and for attending to this matter.
>
> References:
>  * https://ubuntu.com/security/notices/USN-5310-1/

These have all been rebuilt and retagged.

We're having a problem with the grafana snap for 20.04 (it's currently
FTBFS'ing) but that should be indirectly fixed when we update the snap
to the latest upstream grafana version.

Thanks,

-- 
Sergio
GPG key ID: E92F D0B3 6B14 F1F4 D8E0  EB2F 106D A1C8 C3CB BF14