ubuntu-docker-images team mailing list archive
-
ubuntu-docker-images team
-
Mailing list archive
-
Message #00601
bind9 contains outdated Ubuntu packages
-
To:
rocks@xxxxxxxxxxxxx, sergio.durigan@xxxxxxxxxxxxx, athos.ribeiro@xxxxxxxxxxxxx, carl.csaposs@xxxxxxxxxxxxx, dragomir.penev@xxxxxxxxxxxxx, jose.masson@xxxxxxxxxxxxx, leon.mintz@xxxxxxxxxxxxx, paulo.machado@xxxxxxxxxxxxx, ryan.barry@xxxxxxxxxxxxx, simon.aronsson@xxxxxxxxxxxxx, ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx
-
From:
security-team-toolbox-bot@xxxxxxxxxxxxx
-
Date:
Tue, 6 Jun 2023 05:15:09 +0000 (UTC)
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r0d1c92bdf9a9 (arm64; channels: 9.18-22.04_beta)
* perl-base: 6112-2
Revision r18b1ecd6d509 (ppc64le; channels: 9.16-20.04_edge, 9.16-20.04_beta)
* libpython3.8-minimal: 6139-1
* libpython3.8-stdlib: 6139-1
* perl-base: 6112-2
* python3.8: 6139-1
* python3.8-minimal: 6139-1
Revision r22e73d66eff9 (amd64; channels: 9.18-22.04_beta)
* perl-base: 6112-2
Revision r273612d60209 (amd64; channels: 9.18-23.04_edge, edge, latest, 9.18-23.04_beta)
* perl-base: 6112-2
Revision r326a15799637 (arm64; channels: 9.18-23.04_edge, edge, latest, 9.18-23.04_beta)
* perl-base: 6112-2
Revision r3bb80d3a115b (amd64; channels: 9.18-22.10_beta, 9.18-22.10_edge)
* perl-base: 6112-2
Revision r3caa291ed101 (arm64; channels: 9.16-20.04_edge, 9.16-20.04_beta)
* libpython3.8-minimal: 6139-1
* libpython3.8-stdlib: 6139-1
* perl-base: 6112-2
* python3.8: 6139-1
* python3.8-minimal: 6139-1
Revision r55ea7eb57292 (ppc64le; channels: 9.18-23.04_edge, edge, latest, 9.18-23.04_beta)
* perl-base: 6112-2
Revision r593eb1f3dcc6 (arm64; channels: 9.18-22.10_beta, 9.18-22.10_edge)
* perl-base: 6112-2
Revision r6001650a0d4a (s390x; channels: 9.18-22.10_beta, 9.18-22.10_edge)
* perl-base: 6112-2
Revision r7aec903bf00f (s390x; channels: 9.16-20.04_edge, 9.16-20.04_beta)
* libpython3.8-minimal: 6139-1
* libpython3.8-stdlib: 6139-1
* perl-base: 6112-2
* python3.8: 6139-1
* python3.8-minimal: 6139-1
Revision rd0110aa96e24 (s390x; channels: 9.18-22.04_beta)
* perl-base: 6112-2
Revision re0556cf2f219 (ppc64le; channels: 9.18-22.10_beta, 9.18-22.10_edge)
* perl-base: 6112-2
Revision red385eb8996c (amd64; channels: 9.16-20.04_edge, 9.16-20.04_beta)
* libpython3.8-minimal: 6139-1
* libpython3.8-stdlib: 6139-1
* perl-base: 6112-2
* python3.8: 6139-1
* python3.8-minimal: 6139-1
Revision rfc1fced8be71 (ppc64le; channels: 9.18-22.04_beta)
* perl-base: 6112-2
Revision rfdbd6defdc3c (s390x; channels: 9.18-23.04_edge, edge, latest, 9.18-23.04_beta)
* perl-base: 6112-2
Simply rebuilding the rock will pull in the new security updates and
resolve this. If your rock also contains vendored code, now might be a
good time to review it for any needed updates.
Thank you for your rock and for attending to this matter.
References:
* https://ubuntu.com/security/notices/USN-6112-2/
* https://ubuntu.com/security/notices/USN-6139-1/
Follow ups