A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r1ddfa5e14d2d (amd64; channels: 1.6-22.04_edge, 1.6-22.04_beta)
* libperl5.34: 5689-1
* perl: 5689-1
* perl-base: 5689-1
* perl-modules-5.34: 5689-1
Revision r257d0a9dec25 (arm64; channels: 1.6-22.04_edge, 1.6-22.04_beta)
* libperl5.34: 5689-1
* perl: 5689-1
* perl-base: 5689-1
* perl-modules-5.34: 5689-1
Revision r2b828427d573 (amd64; channels: 1.5-20.04_edge, 1.5-20.04_beta)
* libperl5.30: 5689-1
* perl: 5689-1
* perl-base: 5689-1
* perl-modules-5.30: 5689-1
Revision r429aff9cdfd2 (arm64; channels: 1.5-20.04_edge, 1.5-20.04_beta)
* libperl5.30: 5689-1
* perl: 5689-1
* perl-base: 5689-1
* perl-modules-5.30: 5689-1
Revision r44589b745c8d (s390x; channels: 1.5-20.04_edge, 1.5-20.04_beta)
* libperl5.30: 5689-1
* perl: 5689-1
* perl-base: 5689-1
* perl-modules-5.30: 5689-1
Revision r7b7783a6732b (s390x; channels: 1.6-22.04_edge, 1.6-22.04_beta)
* libperl5.34: 5689-1
* perl: 5689-1
* perl-base: 5689-1
* perl-modules-5.34: 5689-1
Revision red108fdd8263 (ppc64le; channels: 1.5-20.04_edge, 1.5-20.04_beta)
* libperl5.30: 5689-1
* perl: 5689-1
* perl-base: 5689-1
* perl-modules-5.30: 5689-1
Revision rf81d98c57ed9 (ppc64le; channels: 1.6-22.04_edge, 1.6-22.04_beta)
* libperl5.34: 5689-1
* perl: 5689-1
* perl-base: 5689-1
* perl-modules-5.34: 5689-1
Simply rebuilding the rock will pull in the new security updates and
resolve this. If your rock also contains vendored code, now might be a
good time to review it for any needed updates.
Thank you for your rock and for attending to this matter.
References:
* https://ubuntu.com/security/notices/USN-5689-1/