A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r03cadce39dfe (arm64; channels: 4.10-20.04_edge, 4.10-20.04_beta)
* libsystemd0: 5928-1
* libudev1: 5928-1
Revision r15c5bf3541be (ppc64le; channels: edge, latest, 5.6-22.10_beta, 5.6-22.10_edge)
* libsystemd0: 5928-1
* libudev1: 5928-1
Revision r461fa9b2c114 (s390x; channels: 5.2-22.04_beta, 5.2-22.04_edge)
* libsystemd0: 5928-1
* libudev1: 5928-1
Revision r537a9072e38d (arm64; channels: edge, latest, 5.6-22.10_beta, 5.6-22.10_edge)
* libsystemd0: 5928-1
* libudev1: 5928-1
Revision r6637af5c565b (s390x; channels: edge, latest, 5.6-22.10_beta, 5.6-22.10_edge)
* libsystemd0: 5928-1
* libudev1: 5928-1
Revision r8645985ef70a (amd64; channels: 5.2-22.04_beta, 5.2-22.04_edge)
* libsystemd0: 5928-1
* libudev1: 5928-1
Revision r976831fbae2e (arm64; channels: 5.2-22.04_beta, 5.2-22.04_edge)
* libsystemd0: 5928-1
* libudev1: 5928-1
Revision rb1c54ac46862 (amd64; channels: 4.10-20.04_edge, 4.10-20.04_beta)
* libsystemd0: 5928-1
* libudev1: 5928-1
Revision rb2235e9dfdef (amd64; channels: edge, latest, 5.6-22.10_beta, 5.6-22.10_edge)
* libsystemd0: 5928-1
* libudev1: 5928-1
Revision rba76cc6733c7 (ppc64le; channels: 4.10-20.04_edge, 4.10-20.04_beta)
* libsystemd0: 5928-1
* libudev1: 5928-1
Revision rdc089bd016af (s390x; channels: 4.10-20.04_edge, 4.10-20.04_beta)
* libsystemd0: 5928-1
* libudev1: 5928-1
Revision rf044fec6dabf (ppc64le; channels: 5.2-22.04_beta, 5.2-22.04_edge)
* libsystemd0: 5928-1
* libudev1: 5928-1
Simply rebuilding the rock will pull in the new security updates and
resolve this. If your rock also contains vendored code, now might be a
good time to review it for any needed updates.
Thank you for your rock and for attending to this matter.
References:
* https://ubuntu.com/security/notices/USN-5928-1/