A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r00b753260c85 (s390x; channels: 1.5-20.04_beta, 1.5-20.04_edge)
* login: 5745-1
* passwd: 5745-1
Revision r13a0cb4dbf88 (s390x; channels: 1.6-22.04_edge, 1.6-22.04_beta)
* login: 5745-1
* passwd: 5745-1
Revision r20235a9bba00 (ppc64le; channels: 1.6-22.04_edge, 1.6-22.04_beta)
* login: 5745-1
* passwd: 5745-1
Revision r7e76c9e38115 (amd64; channels: 1.6-22.04_edge, 1.6-22.04_beta)
* login: 5745-1
* passwd: 5745-1
Revision r8bf3b307939f (arm64; channels: 1.5-20.04_beta, 1.5-20.04_edge)
* login: 5745-1
* passwd: 5745-1
Revision rb552c688e8ce (amd64; channels: 1.5-20.04_beta, 1.5-20.04_edge)
* login: 5745-1
* passwd: 5745-1
Revision rc21fed6b9b55 (arm64; channels: 1.6-22.04_edge, 1.6-22.04_beta)
* login: 5745-1
* passwd: 5745-1
Revision rec9a1fe2968c (ppc64le; channels: 1.5-20.04_beta, 1.5-20.04_edge)
* login: 5745-1
* passwd: 5745-1
Simply rebuilding the rock will pull in the new security updates and
resolve this. If your rock also contains vendored code, now might be a
good time to review it for any needed updates.
Thank you for your rock and for attending to this matter.
References:
* https://ubuntu.com/security/notices/USN-5745-1/