ubuntu-docker-images team mailing list archive
-
ubuntu-docker-images team
-
Mailing list archive
-
Message #00520
apache2 contains outdated Ubuntu packages
-
To:
rocks@xxxxxxxxxxxxx, sergio.durigan@xxxxxxxxxxxxx, athos.ribeiro@xxxxxxxxxxxxx, carl.csaposs@xxxxxxxxxxxxx, dragomir.penev@xxxxxxxxxxxxx, jose.masson@xxxxxxxxxxxxx, leon.mintz@xxxxxxxxxxxxx, paulo.machado@xxxxxxxxxxxxx, ryan.barry@xxxxxxxxxxxxx, simon.aronsson@xxxxxxxxxxxxx, ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx
-
From:
security-team-toolbox-bot@xxxxxxxxxxxxx
-
Date:
Fri, 10 Mar 2023 05:06:34 +0000 (UTC)
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r3b7c3dd3973f (ppc64le; channels: 2.4-22.04_beta, 2.4-22.04_edge)
* apache2: 5942-1
* apache2-bin: 5942-1
* apache2-data: 5942-1
* apache2-utils: 5942-1
Revision r3dd84a6246a8 (s390x; channels: 2.4-22.04_beta, 2.4-22.04_edge)
* apache2: 5942-1
* apache2-bin: 5942-1
* apache2-data: 5942-1
* apache2-utils: 5942-1
Revision r50af26c6a113 (arm64; channels: edge, 2.4-22.10_beta, 2.4-22.10_edge, latest)
* apache2: 5942-1
* apache2-bin: 5942-1
* apache2-data: 5942-1
* apache2-utils: 5942-1
Revision r5e98065186c5 (ppc64le; channels: 2.4-20.04_edge, 2.4-20.04_beta)
* apache2: 5942-1
* apache2-bin: 5942-1
* apache2-data: 5942-1
* apache2-utils: 5942-1
Revision r61a9fd573cac (s390x; channels: 2.4-20.04_edge, 2.4-20.04_beta)
* apache2: 5942-1
* apache2-bin: 5942-1
* apache2-data: 5942-1
* apache2-utils: 5942-1
Revision r727663dd9fa1 (arm64; channels: 2.4-22.04_beta, 2.4-22.04_edge)
* apache2: 5942-1
* apache2-bin: 5942-1
* apache2-data: 5942-1
* apache2-utils: 5942-1
Revision r852fb2c79404 (ppc64le; channels: edge, 2.4-22.10_beta, 2.4-22.10_edge, latest)
* apache2: 5942-1
* apache2-bin: 5942-1
* apache2-data: 5942-1
* apache2-utils: 5942-1
Revision r95dd1c237e60 (amd64; channels: 2.4-22.04_beta, 2.4-22.04_edge)
* apache2: 5942-1
* apache2-bin: 5942-1
* apache2-data: 5942-1
* apache2-utils: 5942-1
Revision rb3a56dcf05bd (amd64; channels: edge, 2.4-22.10_beta, 2.4-22.10_edge, latest)
* apache2: 5942-1
* apache2-bin: 5942-1
* apache2-data: 5942-1
* apache2-utils: 5942-1
Revision rb86fccc2b368 (amd64; channels: 2.4-20.04_edge, 2.4-20.04_beta)
* apache2: 5942-1
* apache2-bin: 5942-1
* apache2-data: 5942-1
* apache2-utils: 5942-1
Revision rce40a95d68e6 (s390x; channels: edge, 2.4-22.10_beta, 2.4-22.10_edge, latest)
* apache2: 5942-1
* apache2-bin: 5942-1
* apache2-data: 5942-1
* apache2-utils: 5942-1
Revision re8010da55c9f (arm64; channels: 2.4-20.04_edge, 2.4-20.04_beta)
* apache2: 5942-1
* apache2-bin: 5942-1
* apache2-data: 5942-1
* apache2-utils: 5942-1
Simply rebuilding the rock will pull in the new security updates and
resolve this. If your rock also contains vendored code, now might be a
good time to review it for any needed updates.
Thank you for your rock and for attending to this matter.
References:
* https://ubuntu.com/security/notices/USN-5942-1/
Follow ups