ubuntu-docker-images team mailing list archive
-
ubuntu-docker-images team
-
Mailing list archive
-
Message #00916
squid contains outdated Ubuntu packages
-
To:
rocks@xxxxxxxxxxxxx, sergio.durigan@xxxxxxxxxxxxx, athos.ribeiro@xxxxxxxxxxxxx, carl.csaposs@xxxxxxxxxxxxx, dragomir.penev@xxxxxxxxxxxxx, jose.masson@xxxxxxxxxxxxx, leon.mintz@xxxxxxxxxxxxx, paulo.machado@xxxxxxxxxxxxx, simon.aronsson@xxxxxxxxxxxxx, ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx
-
From:
security-team-toolbox-bot@xxxxxxxxxxxxx
-
Date:
Tue, 16 Apr 2024 05:15:30 +0000 (UTC)
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r2edd58a0db3c (arm64; channels: latest, 6.1-23.10_edge, 6.1-23.10_beta, edge)
* libgnutls30: 6733-1
Revision r4c17cf86dbac (ppc64le; channels: latest, 6.1-23.10_edge, 6.1-23.10_beta, edge)
* libgnutls30: 6733-1
Revision r4cf8e19cb201 (s390x; channels: latest, 6.1-23.10_edge, 6.1-23.10_beta, edge)
* libgnutls30: 6733-1
Revision r587570693b99 (amd64; channels: 5.2-22.04_beta)
* libgnutls30: 6733-1
Revision r62aa59113d5c (ppc64le; channels: 5.2-22.04_beta)
* libgnutls30: 6733-1
Revision r6c83c298429f (arm64; channels: 5.2-22.04_beta)
* libgnutls30: 6733-1
Revision r7d9600aaa0c1 (amd64; channels: latest, 6.1-23.10_edge, 6.1-23.10_beta, edge)
* libgnutls30: 6733-1
Revision r88d1e92c9bea (amd64; channels: 4.10-20.04_beta)
* libgnutls30: 6733-1
Revision r908f6e851137 (s390x; channels: 5.2-22.04_beta)
* libgnutls30: 6733-1
Revision ra3356e5826c4 (s390x; channels: 4.10-20.04_beta)
* libgnutls30: 6733-1
Revision rc3f1b14e49b3 (ppc64le; channels: 4.10-20.04_beta)
* libgnutls30: 6733-1
Revision re97c3c2dc93c (arm64; channels: 4.10-20.04_beta)
* libgnutls30: 6733-1
Simply rebuilding the rock will pull in the new security updates and
resolve this. If your rock also contains vendored code, now might be a
good time to review it for any needed updates.
Thank you for your rock and for attending to this matter.
References:
* https://ubuntu.com/security/notices/USN-6733-1/
Follow ups