A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r3f423cad0d53 (arm64; channels: 1.22-22.10_edge, 1.22-22.10_beta)
* libcap2: 6166-1
* libcap2-bin: 6166-1
Revision r4193f43fb4c0 (s390x; channels: 1.18-20.04_beta)
* libcap2: 6166-1
* libcap2-bin: 6166-1
Revision r502459c066e7 (amd64; channels: 1.18-20.04_beta)
* libcap2: 6166-1
* libcap2-bin: 6166-1
Revision r5a5f1c1f4802 (arm64; channels: 1.18-20.04_beta)
* libcap2: 6166-1
* libcap2-bin: 6166-1
Revision r6b745c2ecefb (ppc64le; channels: 1.18-20.04_beta)
* libcap2: 6166-1
* libcap2-bin: 6166-1
Revision r6c037a503bad (amd64; channels: 1.22-22.10_edge, 1.22-22.10_beta)
* libcap2: 6166-1
* libcap2-bin: 6166-1
Revision raaac4aef2823 (s390x; channels: 1.18-22.04_beta)
* libcap2: 6166-1
* libcap2-bin: 6166-1
Revision rd5e18a05233b (amd64; channels: 1.18-22.04_beta)
* libcap2: 6166-1
* libcap2-bin: 6166-1
Revision rdae1777fea9b (ppc64le; channels: 1.22-22.10_edge, 1.22-22.10_beta)
* libcap2: 6166-1
* libcap2-bin: 6166-1
Revision rf68c60e2f55d (arm64; channels: 1.18-22.04_beta)
* libcap2: 6166-1
* libcap2-bin: 6166-1
Revision rf7420452bcee (ppc64le; channels: 1.18-22.04_beta)
* libcap2: 6166-1
* libcap2-bin: 6166-1
Revision rfc28d2e0599d (s390x; channels: 1.22-22.10_edge, 1.22-22.10_beta)
* libcap2: 6166-1
* libcap2-bin: 6166-1
Simply rebuilding the rock will pull in the new security updates and
resolve this. If your rock also contains vendored code, now might be a
good time to review it for any needed updates.
Thank you for your rock and for attending to this matter.
References:
* https://ubuntu.com/security/notices/USN-6166-1/