← Back to team overview

ubuntu-docker-images team mailing list archive

squid contains outdated Ubuntu packages

 

A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:

Revision r17fd3c16e527 (arm64; channels: 5.2-22.04_edge, 5.2-22.04_beta)
 * bsdutils: 6719-2
 * libblkid1: 6719-2
 * libmount1: 6719-2
 * libsmartcols1: 6719-2
 * libuuid1: 6719-2
 * mount: 6719-2
 * squid: 6728-1
 * squid-common: 6728-1
 * util-linux: 6719-2

Revision r2504277187c0 (arm64; channels: 4.10-20.04_beta)
 * bsdutils: 6719-2
 * fdisk: 6719-2
 * libblkid1: 6719-2
 * libfdisk1: 6719-2
 * libmount1: 6719-2
 * libsmartcols1: 6719-2
 * libuuid1: 6719-2
 * mount: 6719-2
 * squid: 6728-1
 * squid-common: 6728-1
 * util-linux: 6719-2

Revision r3c1e7281ea07 (amd64; channels: 5.2-22.04_edge, 5.2-22.04_beta)
 * bsdutils: 6719-2
 * libblkid1: 6719-2
 * libmount1: 6719-2
 * libsmartcols1: 6719-2
 * libuuid1: 6719-2
 * mount: 6719-2
 * squid: 6728-1
 * squid-common: 6728-1
 * util-linux: 6719-2

Revision r514ac42e0aea (amd64; channels: latest, 6.1-23.10_beta, edge)
 * bsdutils: 6719-2
 * libblkid1: 6719-2
 * libmount1: 6719-2
 * libsmartcols1: 6719-2
 * libuuid1: 6719-2
 * mount: 6719-2
 * squid: 6728-1
 * squid-common: 6728-1
 * util-linux: 6719-2

Revision r5e4aa30fb42f (s390x; channels: 5.2-22.04_edge, 5.2-22.04_beta)
 * bsdutils: 6719-2
 * libblkid1: 6719-2
 * libmount1: 6719-2
 * libsmartcols1: 6719-2
 * libuuid1: 6719-2
 * mount: 6719-2
 * squid: 6728-1
 * squid-common: 6728-1
 * util-linux: 6719-2

Revision r68f0064d9fc6 (ppc64le; channels: 4.10-20.04_beta)
 * bsdutils: 6719-2
 * fdisk: 6719-2
 * libblkid1: 6719-2
 * libfdisk1: 6719-2
 * libmount1: 6719-2
 * libsmartcols1: 6719-2
 * libuuid1: 6719-2
 * mount: 6719-2
 * squid: 6728-1
 * squid-common: 6728-1
 * util-linux: 6719-2

Revision r8cfe6ac63172 (s390x; channels: 4.10-20.04_beta)
 * bsdutils: 6719-2
 * fdisk: 6719-2
 * libblkid1: 6719-2
 * libfdisk1: 6719-2
 * libmount1: 6719-2
 * libsmartcols1: 6719-2
 * libuuid1: 6719-2
 * mount: 6719-2
 * squid: 6728-1
 * squid-common: 6728-1
 * util-linux: 6719-2

Revision r8ed4d24c765f (ppc64le; channels: latest, 6.1-23.10_beta, edge)
 * bsdutils: 6719-2
 * libblkid1: 6719-2
 * libmount1: 6719-2
 * libsmartcols1: 6719-2
 * libuuid1: 6719-2
 * mount: 6719-2
 * squid: 6728-1
 * squid-common: 6728-1
 * util-linux: 6719-2

Revision r938522250ec9 (arm64; channels: latest, 6.1-23.10_beta, edge)
 * bsdutils: 6719-2
 * libblkid1: 6719-2
 * libmount1: 6719-2
 * libsmartcols1: 6719-2
 * libuuid1: 6719-2
 * mount: 6719-2
 * squid: 6728-1
 * squid-common: 6728-1
 * util-linux: 6719-2

Revision r947e0354580a (amd64; channels: 4.10-20.04_beta)
 * bsdutils: 6719-2
 * fdisk: 6719-2
 * libblkid1: 6719-2
 * libfdisk1: 6719-2
 * libmount1: 6719-2
 * libsmartcols1: 6719-2
 * libuuid1: 6719-2
 * mount: 6719-2
 * squid: 6728-1
 * squid-common: 6728-1
 * util-linux: 6719-2

Revision r970e9a78f803 (s390x; channels: latest, 6.1-23.10_beta, edge)
 * bsdutils: 6719-2
 * libblkid1: 6719-2
 * libmount1: 6719-2
 * libsmartcols1: 6719-2
 * libuuid1: 6719-2
 * mount: 6719-2
 * squid: 6728-1
 * squid-common: 6728-1
 * util-linux: 6719-2

Revision ra30033ee960b (ppc64le; channels: 5.2-22.04_edge, 5.2-22.04_beta)
 * bsdutils: 6719-2
 * libblkid1: 6719-2
 * libmount1: 6719-2
 * libsmartcols1: 6719-2
 * libuuid1: 6719-2
 * mount: 6719-2
 * squid: 6728-1
 * squid-common: 6728-1
 * util-linux: 6719-2

Simply rebuilding the rock will pull in the new security updates and
resolve this. If your rock also contains vendored code, now might be a
good time to review it for any needed updates.

Thank you for your rock and for attending to this matter.

References:
 * https://ubuntu.com/security/notices/USN-6719-2/
 * https://ubuntu.com/security/notices/USN-6728-1/


Follow ups