ubuntu-docker-images team mailing list archive
-
ubuntu-docker-images team
-
Mailing list archive
-
Message #00458
apache2 contains outdated Ubuntu packages
-
To:
rocks@xxxxxxxxxxxxx, sergio.durigan@xxxxxxxxxxxxx, athos.ribeiro@xxxxxxxxxxxxx, carl.csaposs@xxxxxxxxxxxxx, dragomir.penev@xxxxxxxxxxxxx, jose.masson@xxxxxxxxxxxxx, leon.mintz@xxxxxxxxxxxxx, paulo.machado@xxxxxxxxxxxxx, ryan.barry@xxxxxxxxxxxxx, simon.aronsson@xxxxxxxxxxxxx, ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx
-
From:
security-team-toolbox-bot@xxxxxxxxxxxxx
-
Date:
Thu, 26 Jan 2023 05:06:41 +0000 (UTC)
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r07c689e0b8bd (amd64; channels: 2.4-20.04_beta, 2.4-20.04_edge)
* libgssapi-krb5-2: 5828-1
* libk5crypto3: 5828-1
* libkrb5-3: 5828-1
* libkrb5support0: 5828-1
* libpam-modules: 5825-1
* libpam-modules-bin: 5825-1
* libpam-runtime: 5825-1
* libpam0g: 5825-1
Revision r2d188ff23b7c (s390x; channels: 2.4-22.04_beta, 2.4-22.04_edge)
* libgssapi-krb5-2: 5828-1
* libk5crypto3: 5828-1
* libkrb5-3: 5828-1
* libkrb5support0: 5828-1
* libpam-modules: 5825-1
* libpam-modules-bin: 5825-1
* libpam-runtime: 5825-1
* libpam0g: 5825-1
Revision r3bbf7370b4e6 (ppc64le; channels: 2.4-22.04_beta, 2.4-22.04_edge)
* libgssapi-krb5-2: 5828-1
* libk5crypto3: 5828-1
* libkrb5-3: 5828-1
* libkrb5support0: 5828-1
* libpam-modules: 5825-1
* libpam-modules-bin: 5825-1
* libpam-runtime: 5825-1
* libpam0g: 5825-1
Revision r3c31967dd6d1 (arm64; channels: 2.4-20.04_beta, 2.4-20.04_edge)
* libgssapi-krb5-2: 5828-1
* libk5crypto3: 5828-1
* libkrb5-3: 5828-1
* libkrb5support0: 5828-1
* libpam-modules: 5825-1
* libpam-modules-bin: 5825-1
* libpam-runtime: 5825-1
* libpam0g: 5825-1
Revision r426a4f5a448c (s390x; channels: 2.4-20.04_beta, 2.4-20.04_edge)
* libgssapi-krb5-2: 5828-1
* libk5crypto3: 5828-1
* libkrb5-3: 5828-1
* libkrb5support0: 5828-1
* libpam-modules: 5825-1
* libpam-modules-bin: 5825-1
* libpam-runtime: 5825-1
* libpam0g: 5825-1
Revision r7401af0842bf (amd64; channels: 2.4-22.10_edge, 2.4-22.10_beta, edge, latest)
* libgssapi-krb5-2: 5828-1
* libk5crypto3: 5828-1
* libkrb5-3: 5828-1
* libkrb5support0: 5828-1
* libpam-modules: 5825-1
* libpam-modules-bin: 5825-1
* libpam-runtime: 5825-1
* libpam0g: 5825-1
Revision r8881e688abe4 (amd64; channels: 2.4-22.04_beta, 2.4-22.04_edge)
* libgssapi-krb5-2: 5828-1
* libk5crypto3: 5828-1
* libkrb5-3: 5828-1
* libkrb5support0: 5828-1
* libpam-modules: 5825-1
* libpam-modules-bin: 5825-1
* libpam-runtime: 5825-1
* libpam0g: 5825-1
Revision r917572000976 (s390x; channels: 2.4-22.10_edge, 2.4-22.10_beta, edge, latest)
* libgssapi-krb5-2: 5828-1
* libk5crypto3: 5828-1
* libkrb5-3: 5828-1
* libkrb5support0: 5828-1
* libpam-modules: 5825-1
* libpam-modules-bin: 5825-1
* libpam-runtime: 5825-1
* libpam0g: 5825-1
Revision r973256caceb2 (arm64; channels: 2.4-22.04_beta, 2.4-22.04_edge)
* libgssapi-krb5-2: 5828-1
* libk5crypto3: 5828-1
* libkrb5-3: 5828-1
* libkrb5support0: 5828-1
* libpam-modules: 5825-1
* libpam-modules-bin: 5825-1
* libpam-runtime: 5825-1
* libpam0g: 5825-1
Revision rc87830e3721d (ppc64le; channels: 2.4-20.04_beta, 2.4-20.04_edge)
* libgssapi-krb5-2: 5828-1
* libk5crypto3: 5828-1
* libkrb5-3: 5828-1
* libkrb5support0: 5828-1
* libpam-modules: 5825-1
* libpam-modules-bin: 5825-1
* libpam-runtime: 5825-1
* libpam0g: 5825-1
Revision rcbf61175f93a (arm64; channels: 2.4-22.10_edge, 2.4-22.10_beta, edge, latest)
* libgssapi-krb5-2: 5828-1
* libk5crypto3: 5828-1
* libkrb5-3: 5828-1
* libkrb5support0: 5828-1
* libpam-modules: 5825-1
* libpam-modules-bin: 5825-1
* libpam-runtime: 5825-1
* libpam0g: 5825-1
Revision rf3801dd1d733 (ppc64le; channels: 2.4-22.10_edge, 2.4-22.10_beta, edge, latest)
* libgssapi-krb5-2: 5828-1
* libk5crypto3: 5828-1
* libkrb5-3: 5828-1
* libkrb5support0: 5828-1
* libpam-modules: 5825-1
* libpam-modules-bin: 5825-1
* libpam-runtime: 5825-1
* libpam0g: 5825-1
Simply rebuilding the rock will pull in the new security updates and
resolve this. If your rock also contains vendored code, now might be a
good time to review it for any needed updates.
Thank you for your rock and for attending to this matter.
References:
* https://ubuntu.com/security/notices/USN-5825-1/
* https://ubuntu.com/security/notices/USN-5828-1/
Follow ups