ubuntu-docker-images team mailing list archive
-
ubuntu-docker-images team
-
Mailing list archive
-
Message #00900
nginx contains outdated Ubuntu packages
-
To:
rocks@xxxxxxxxxxxxx, sergio.durigan@xxxxxxxxxxxxx, athos.ribeiro@xxxxxxxxxxxxx, carl.csaposs@xxxxxxxxxxxxx, dragomir.penev@xxxxxxxxxxxxx, jose.masson@xxxxxxxxxxxxx, leon.mintz@xxxxxxxxxxxxx, paulo.machado@xxxxxxxxxxxxx, simon.aronsson@xxxxxxxxxxxxx, ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx
-
From:
security-team-toolbox-bot@xxxxxxxxxxxxx
-
Date:
Thu, 11 Apr 2024 05:13:05 +0000 (UTC)
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r19c8e7a08e5a (ppc64le; channels: 1.24-23.10_edge, latest, 1.24-23.10_beta, edge)
* bsdutils: 6719-2
* libblkid1: 6719-2
* libmount1: 6719-2
* libsmartcols1: 6719-2
* libuuid1: 6719-2
* mount: 6719-2
* util-linux: 6719-2
Revision r2cc79c262ac0 (arm64; channels: 1.18-20.04_beta)
* bsdutils: 6719-2
* fdisk: 6719-2
* libblkid1: 6719-2
* libfdisk1: 6719-2
* libmount1: 6719-2
* libsmartcols1: 6719-2
* libuuid1: 6719-2
* mount: 6719-2
* util-linux: 6719-2
Revision r31864f076b7f (amd64; channels: 1.24-23.10_edge, latest, 1.24-23.10_beta, edge)
* bsdutils: 6719-2
* libblkid1: 6719-2
* libmount1: 6719-2
* libsmartcols1: 6719-2
* libuuid1: 6719-2
* mount: 6719-2
* util-linux: 6719-2
Revision r35f03d5a5f14 (amd64; channels: 1.18-20.04_beta)
* bsdutils: 6719-2
* fdisk: 6719-2
* libblkid1: 6719-2
* libfdisk1: 6719-2
* libmount1: 6719-2
* libsmartcols1: 6719-2
* libuuid1: 6719-2
* mount: 6719-2
* util-linux: 6719-2
Revision r3cb685ea61e1 (arm64; channels: 1.18-22.04_beta)
* bsdutils: 6719-2
* libblkid1: 6719-2
* libmount1: 6719-2
* libsmartcols1: 6719-2
* libuuid1: 6719-2
* mount: 6719-2
* util-linux: 6719-2
Revision r4aac81b9714d (ppc64le; channels: 1.18-22.04_beta)
* bsdutils: 6719-2
* libblkid1: 6719-2
* libmount1: 6719-2
* libsmartcols1: 6719-2
* libuuid1: 6719-2
* mount: 6719-2
* util-linux: 6719-2
Revision r595784c6e6b2 (amd64; channels: 1.18-22.04_beta)
* bsdutils: 6719-2
* libblkid1: 6719-2
* libmount1: 6719-2
* libsmartcols1: 6719-2
* libuuid1: 6719-2
* mount: 6719-2
* util-linux: 6719-2
Revision r6acab16ea3a6 (s390x; channels: 1.24-23.10_edge, latest, 1.24-23.10_beta, edge)
* bsdutils: 6719-2
* libblkid1: 6719-2
* libmount1: 6719-2
* libsmartcols1: 6719-2
* libuuid1: 6719-2
* mount: 6719-2
* util-linux: 6719-2
Revision r828aefb5fb25 (s390x; channels: 1.18-20.04_beta)
* bsdutils: 6719-2
* fdisk: 6719-2
* libblkid1: 6719-2
* libfdisk1: 6719-2
* libmount1: 6719-2
* libsmartcols1: 6719-2
* libuuid1: 6719-2
* mount: 6719-2
* util-linux: 6719-2
Revision rca4aa3ad5862 (ppc64le; channels: 1.18-20.04_beta)
* bsdutils: 6719-2
* fdisk: 6719-2
* libblkid1: 6719-2
* libfdisk1: 6719-2
* libmount1: 6719-2
* libsmartcols1: 6719-2
* libuuid1: 6719-2
* mount: 6719-2
* util-linux: 6719-2
Revision rdb51ca8eb7ce (s390x; channels: 1.18-22.04_beta)
* bsdutils: 6719-2
* libblkid1: 6719-2
* libmount1: 6719-2
* libsmartcols1: 6719-2
* libuuid1: 6719-2
* mount: 6719-2
* util-linux: 6719-2
Revision rf28bc59789dc (arm64; channels: 1.24-23.10_edge, latest, 1.24-23.10_beta, edge)
* bsdutils: 6719-2
* libblkid1: 6719-2
* libmount1: 6719-2
* libsmartcols1: 6719-2
* libuuid1: 6719-2
* mount: 6719-2
* util-linux: 6719-2
Simply rebuilding the rock will pull in the new security updates and
resolve this. If your rock also contains vendored code, now might be a
good time to review it for any needed updates.
Thank you for your rock and for attending to this matter.
References:
* https://ubuntu.com/security/notices/USN-6719-2/
Follow ups