A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r0d27d08afa5f (ppc64le; channels: 2.4-22.04_edge, 2.4-22.04_beta)
* libperl5.34: 6112-2
* libssh-4: 6138-1
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.34: 6112-2
Revision r1e638bbe1a27 (ppc64le; channels: edge, latest, 2.4-23.04_beta)
* libperl5.36: 6112-2
* libssh-4: 6138-1
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.36: 6112-2
Revision r2fb6c84e09cf (amd64; channels: edge, latest, 2.4-23.04_beta)
* libperl5.36: 6112-2
* libssh-4: 6138-1
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.36: 6112-2
Revision r38aa09690503 (s390x; channels: 2.4-22.04_edge, 2.4-22.04_beta)
* libperl5.34: 6112-2
* libssh-4: 6138-1
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.34: 6112-2
Revision r46e8468ed1a3 (arm64; channels: 2.4-22.04_edge, 2.4-22.04_beta)
* libperl5.34: 6112-2
* libssh-4: 6138-1
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.34: 6112-2
Revision r4986cbed3ff6 (amd64; channels: 2.4-22.04_edge, 2.4-22.04_beta)
* libperl5.34: 6112-2
* libssh-4: 6138-1
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.34: 6112-2
Revision r6f7dbe22aae0 (arm64; channels: 2.4-20.04_beta)
* libperl5.30: 6112-2
* libssh-4: 6138-1
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.30: 6112-2
Revision r7b49768c8976 (ppc64le; channels: 2.4-20.04_beta)
* libperl5.30: 6112-2
* libssh-4: 6138-1
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.30: 6112-2
Revision r98172da4f807 (amd64; channels: 2.4-22.10_beta, 2.4-22.10_edge)
* libperl5.34: 6112-2
* libssh-4: 6138-1
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.34: 6112-2
Revision rbd42080c3f18 (ppc64le; channels: 2.4-22.10_beta, 2.4-22.10_edge)
* libperl5.34: 6112-2
* libssh-4: 6138-1
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.34: 6112-2
Revision rbfe31ced73a3 (s390x; channels: 2.4-22.10_beta, 2.4-22.10_edge)
* libperl5.34: 6112-2
* libssh-4: 6138-1
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.34: 6112-2
Revision rc3d5e69de61e (arm64; channels: 2.4-22.10_beta, 2.4-22.10_edge)
* libperl5.34: 6112-2
* libssh-4: 6138-1
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.34: 6112-2
Revision re092d3ddcbcc (s390x; channels: edge, latest, 2.4-23.04_beta)
* libperl5.36: 6112-2
* libssh-4: 6138-1
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.36: 6112-2
Revision re24a2af89321 (s390x; channels: 2.4-20.04_beta)
* libperl5.30: 6112-2
* libssh-4: 6138-1
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.30: 6112-2
Revision ree4219d3dfbe (amd64; channels: 2.4-20.04_beta)
* libperl5.30: 6112-2
* libssh-4: 6138-1
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.30: 6112-2
Revision rfd83a83c4f5d (arm64; channels: edge, latest, 2.4-23.04_beta)
* libperl5.36: 6112-2
* libssh-4: 6138-1
* perl: 6112-2
* perl-base: 6112-2
* perl-modules-5.36: 6112-2
Simply rebuilding the rock will pull in the new security updates and
resolve this. If your rock also contains vendored code, now might be a
good time to review it for any needed updates.
Thank you for your rock and for attending to this matter.
References:
* https://ubuntu.com/security/notices/USN-6112-2/
* https://ubuntu.com/security/notices/USN-6138-1/