ubuntu-docker-images team mailing list archive
-
ubuntu-docker-images team
-
Mailing list archive
-
Message #00389
Fwd: bind9 contains outdated Ubuntu packages
FYI
I have just updated the list of supported rocks as requested.
There is a part of this which requires a review-tools update to land so
everyone can get this notification:
https://code.launchpad.net/~emitorino/review-tools/+git/review-tools/+merge/433136
.
I am fw this manually in the meantime.
---------- Forwarded message ---------
From: <security-team-toolbox-bot@xxxxxxxxxxxxx>
Date: Wed, Nov 16, 2022 at 12:41 PM
Subject: bind9 contains outdated Ubuntu packages
To: <rocks@xxxxxxxxxxxxx>, <sergio.durigan@xxxxxxxxxxxxx>
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r0a9019b7f98f (amd64; channels: 9.16-21.10_beta, 9.16-21.10_edge)
* bind9: 5332-1
* bind9-libs: 5332-1
* bind9-utils: 5332-1
* dpkg: 5446-1
* e2fsprogs: 5464-1
* gpgv: 5503-1
* gzip: 5378-1
* libc-bin: 5310-1
* libc6: 5310-1
* libcom-err2: 5464-1
* libexpat1: 5288-1, 5320-1
* libext2fs2: 5464-1
* liblzma5: 5378-2
* libpcre3: 5425-1
* libpython3.9-minimal: 5519-1
* libpython3.9-stdlib: 5519-1
* libsepol1: 5391-1
* libsqlite3-0: 5403-1
* libss2: 5464-1
* libssl1.1: 5328-1, 5402-1, 5488-1, 5502-1
* libxml2: 5324-1, 5422-1
* logsave: 5464-1
* python3.9: 5519-1
* python3.9-minimal: 5519-1
* zlib1g: 5355-1
Revision r4c4b2efe6a2b (amd64; channels: 9.16-20.04_beta, 9.16-20.04_edge)
* libsqlite3-0: 5716-1
Revision r7b85fed5fcc4 (s390x; channels: 9.16-21.10_beta, 9.16-21.10_edge)
* bind9: 5332-1
* bind9-libs: 5332-1
* bind9-utils: 5332-1
* dpkg: 5446-1
* e2fsprogs: 5464-1
* gpgv: 5503-1
* gzip: 5378-1
* libc-bin: 5310-1
* libc6: 5310-1
* libcom-err2: 5464-1
* libexpat1: 5288-1, 5320-1
* libext2fs2: 5464-1
* liblzma5: 5378-2
* libpcre3: 5425-1
* libpython3.9-minimal: 5519-1
* libpython3.9-stdlib: 5519-1
* libsepol1: 5391-1
* libsqlite3-0: 5403-1
* libss2: 5464-1
* libssl1.1: 5328-1, 5402-1, 5488-1, 5502-1
* libxml2: 5324-1, 5422-1
* logsave: 5464-1
* python3.9: 5519-1
* python3.9-minimal: 5519-1
* zlib1g: 5355-1
Revision r84c32bca29ee (arm64; channels: 9.16-20.04_beta, 9.16-20.04_edge)
* libsqlite3-0: 5716-1
Revision r881db1f11748 (ppc64le; channels: 9.16-20.04_beta, 9.16-20.04_edge)
* libsqlite3-0: 5716-1
Revision r8e2755cb7578 (ppc64le; channels: 9.16-21.10_beta, 9.16-21.10_edge)
* bind9: 5332-1
* bind9-libs: 5332-1
* bind9-utils: 5332-1
* dpkg: 5446-1
* e2fsprogs: 5464-1
* gpgv: 5503-1
* gzip: 5378-1
* libc-bin: 5310-1
* libc6: 5310-1
* libcom-err2: 5464-1
* libexpat1: 5288-1, 5320-1
* libext2fs2: 5464-1
* liblzma5: 5378-2
* libpcre3: 5425-1
* libpython3.9-minimal: 5519-1
* libpython3.9-stdlib: 5519-1
* libsepol1: 5391-1
* libsqlite3-0: 5403-1
* libss2: 5464-1
* libssl1.1: 5328-1, 5402-1, 5488-1, 5502-1
* libxml2: 5324-1, 5422-1
* logsave: 5464-1
* python3.9: 5519-1
* python3.9-minimal: 5519-1
* zlib1g: 5355-1
Revision r8f498f00ae37 (s390x; channels: 9.16-20.04_beta, 9.16-20.04_edge)
* libsqlite3-0: 5716-1
Revision rece0be8143e2 (arm64; channels: 9.16-21.10_beta, 9.16-21.10_edge)
* bind9: 5332-1
* bind9-libs: 5332-1
* bind9-utils: 5332-1
* dpkg: 5446-1
* e2fsprogs: 5464-1
* gpgv: 5503-1
* gzip: 5378-1
* libc-bin: 5310-1
* libc6: 5310-1
* libcom-err2: 5464-1
* libexpat1: 5288-1, 5320-1
* libext2fs2: 5464-1
* liblzma5: 5378-2
* libpcre3: 5425-1
* libpython3.9-minimal: 5519-1
* libpython3.9-stdlib: 5519-1
* libsepol1: 5391-1
* libsqlite3-0: 5403-1
* libss2: 5464-1
* libssl1.1: 5328-1, 5402-1, 5488-1, 5502-1
* libxml2: 5324-1, 5422-1
* logsave: 5464-1
* python3.9: 5519-1
* python3.9-minimal: 5519-1
* zlib1g: 5355-1
Simply rebuilding the rock will pull in the new security updates and
resolve this. If your rock also contains vendored code, now might be a
good time to review it for any needed updates.
Thank you for your rock and for attending to this matter.
References:
* https://ubuntu.com/security/notices/USN-5288-1/
* https://ubuntu.com/security/notices/USN-5310-1/
* https://ubuntu.com/security/notices/USN-5320-1/
* https://ubuntu.com/security/notices/USN-5324-1/
* https://ubuntu.com/security/notices/USN-5328-1/
* https://ubuntu.com/security/notices/USN-5332-1/
* https://ubuntu.com/security/notices/USN-5355-1/
* https://ubuntu.com/security/notices/USN-5378-1/
* https://ubuntu.com/security/notices/USN-5378-2/
* https://ubuntu.com/security/notices/USN-5391-1/
* https://ubuntu.com/security/notices/USN-5402-1/
* https://ubuntu.com/security/notices/USN-5403-1/
* https://ubuntu.com/security/notices/USN-5422-1/
* https://ubuntu.com/security/notices/USN-5425-1/
* https://ubuntu.com/security/notices/USN-5446-1/
* https://ubuntu.com/security/notices/USN-5464-1/
* https://ubuntu.com/security/notices/USN-5488-1/
* https://ubuntu.com/security/notices/USN-5502-1/
* https://ubuntu.com/security/notices/USN-5503-1/
* https://ubuntu.com/security/notices/USN-5519-1/
* https://ubuntu.com/security/notices/USN-5716-1/
Follow ups