ubuntu-docker-images team mailing list archive
-
ubuntu-docker-images team
-
Mailing list archive
-
Message #00217
redis contains outdated Ubuntu packages
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r046455c82052 (ppc64le; channels: 6.0-21.10_beta)
* dpkg: 5446-1
Revision r0a3816f939eb (ppc64le; channels: 6.2-22.04_edge)
* dpkg: 5446-1
Revision r0b7f156c6068 (s390x; channels: 5.0-20.04_beta)
* dpkg: 5446-1
Revision r160c62c00c51 (amd64; channels: 6.0-21.10_beta)
* dpkg: 5446-1
Revision r18418a815af9 (arm64; channels: 5.0-20.04_beta)
* dpkg: 5446-1
Revision r1cffce4884bf (ppc64le; channels: 6.0-21.10_edge)
* dpkg: 5446-1
Revision r2230def8e9af (ppc64le; channels: 5.0-20.04_edge)
* dpkg: 5446-1
Revision r2cc0d8d2ce60 (amd64; channels: 6.0-21.10_edge)
* dpkg: 5446-1
Revision r33dbf5ae6d54 (ppc64le; channels: edge, latest, 6.2-22.04_beta)
* dpkg: 5446-1
Revision r3634d99ae559 (arm64; channels: edge, latest, 6.2-22.04_beta)
* dpkg: 5446-1
Revision r37bab93477cf (amd64; channels: edge, latest, 6.2-22.04_beta)
* dpkg: 5446-1
Revision r3ebbd542643f (arm64; channels: 6.0-21.10_beta)
* dpkg: 5446-1
Revision r4e6882a5becb (s390x; channels: 5.0-20.04_edge)
* dpkg: 5446-1
Revision r5ca3d4a473fb (s390x; channels: 6.0-21.10_edge)
* dpkg: 5446-1
Revision r720f99134219 (amd64; channels: 5.0-20.04_edge)
* dpkg: 5446-1
Revision r789aeef7ad4a (amd64; channels: 5.0-20.04_beta)
* dpkg: 5446-1
Revision r8b9cc0867b93 (ppc64le; channels: 5.0-20.04_beta)
* dpkg: 5446-1
Revision r8c7b556b5b53 (amd64; channels: 6.2-22.04_edge)
* dpkg: 5446-1
Revision r902182683541 (s390x; channels: 6.0-21.10_beta)
* dpkg: 5446-1
Revision rac5404a6feb0 (arm64; channels: 6.0-21.10_edge)
* dpkg: 5446-1
Revision rcf646eb3dabb (arm64; channels: 5.0-20.04_edge)
* dpkg: 5446-1
Revision rd180ce4f9a4b (arm64; channels: 6.2-22.04_edge)
* dpkg: 5446-1
Revision re446e68e1b3c (s390x; channels: edge, latest, 6.2-22.04_beta)
* dpkg: 5446-1
Simply rebuilding the rock will pull in the new security updates and
resolve this. If your rock also contains vendored code, now might be a
good time to review it for any needed updates.
Thank you for your rock and for attending to this matter.
References:
* https://ubuntu.com/security/notices/USN-5446-1/