ubuntu-docker-images team mailing list archive
-
ubuntu-docker-images team
-
Mailing list archive
-
Message #00603
squid contains outdated Ubuntu packages
-
To:
rocks@xxxxxxxxxxxxx, sergio.durigan@xxxxxxxxxxxxx, athos.ribeiro@xxxxxxxxxxxxx, carl.csaposs@xxxxxxxxxxxxx, dragomir.penev@xxxxxxxxxxxxx, jose.masson@xxxxxxxxxxxxx, leon.mintz@xxxxxxxxxxxxx, paulo.machado@xxxxxxxxxxxxx, ryan.barry@xxxxxxxxxxxxx, simon.aronsson@xxxxxxxxxxxxx, ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx
-
From:
security-team-toolbox-bot@xxxxxxxxxxxxx
-
Date:
Tue, 6 Jun 2023 05:15:13 +0000 (UTC)
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r1237490bcf8d (amd64; channels: 5.6-22.10_edge, 5.6-22.10_beta)
* libperl5.34: 6112-2
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.34: 6112-2
Revision r137275a4e8d9 (arm64; channels: 5.2-22.04_beta, 5.2-22.04_edge)
* libperl5.34: 6112-2
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.34: 6112-2
Revision r15c8c2663fff (arm64; channels: 5.6-22.10_edge, 5.6-22.10_beta)
* libperl5.34: 6112-2
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.34: 6112-2
Revision r248c13580a78 (s390x; channels: edge, latest, 5.7-23.04_beta)
* libperl5.36: 6112-2
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.36: 6112-2
Revision r3e20d6ee3150 (arm64; channels: 4.10-20.04_beta)
* libperl5.30: 6112-2
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.30: 6112-2
Revision r423b412aab0b (ppc64le; channels: 5.6-22.10_edge, 5.6-22.10_beta)
* libperl5.34: 6112-2
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.34: 6112-2
Revision r44da4861d73f (ppc64le; channels: edge, latest, 5.7-23.04_beta)
* libperl5.36: 6112-2
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.36: 6112-2
Revision r69b2cd8e1f92 (s390x; channels: 5.6-22.10_edge, 5.6-22.10_beta)
* libperl5.34: 6112-2
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.34: 6112-2
Revision r7009921603f1 (amd64; channels: 5.2-22.04_beta, 5.2-22.04_edge)
* libperl5.34: 6112-2
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.34: 6112-2
Revision r7404cab866cb (s390x; channels: 4.10-20.04_beta)
* libperl5.30: 6112-2
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.30: 6112-2
Revision r8bc455207cf0 (ppc64le; channels: 4.10-20.04_beta)
* libperl5.30: 6112-2
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.30: 6112-2
Revision rad0dcc5e0524 (ppc64le; channels: 5.2-22.04_beta, 5.2-22.04_edge)
* libperl5.34: 6112-2
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.34: 6112-2
Revision rcc53ec10f143 (arm64; channels: edge, latest, 5.7-23.04_beta)
* libperl5.36: 6112-2
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.36: 6112-2
Revision rce9ec878f970 (s390x; channels: 5.2-22.04_beta, 5.2-22.04_edge)
* libperl5.34: 6112-2
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.34: 6112-2
Revision rd910924957a3 (amd64; channels: edge, latest, 5.7-23.04_beta)
* libperl5.36: 6112-2
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.36: 6112-2
Revision rdda2e94ee589 (amd64; channels: 4.10-20.04_beta)
* libperl5.30: 6112-2
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.30: 6112-2
Simply rebuilding the rock will pull in the new security updates and
resolve this. If your rock also contains vendored code, now might be a
good time to review it for any needed updates.
Thank you for your rock and for attending to this matter.
References:
* https://ubuntu.com/security/notices/USN-6112-2/
Follow ups