ubuntu-docker-images team mailing list archive
-
ubuntu-docker-images team
-
Mailing list archive
-
Message #00944
squid contains outdated Ubuntu packages
-
To:
rocks@xxxxxxxxxxxxx, sergio.durigan@xxxxxxxxxxxxx, athos.ribeiro@xxxxxxxxxxxxx, carl.csaposs@xxxxxxxxxxxxx, dragomir.penev@xxxxxxxxxxxxx, jose.masson@xxxxxxxxxxxxx, leon.mintz@xxxxxxxxxxxxx, paulo.machado@xxxxxxxxxxxxx, simon.aronsson@xxxxxxxxxxxxx, ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx
-
From:
security-team-toolbox-bot@xxxxxxxxxxxxx
-
Date:
Sat, 1 Jun 2024 05:14:19 +0000 (UTC)
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r26abdc263a07 (ppc64le; channels: 5.2-22.04_beta)
* libc-bin: 6804-1
* libc6: 6804-1
Revision r4691c379a236 (amd64; channels: 4.10-20.04_edge, 4.10-20.04_beta)
* libc-bin: 6804-1
* libc6: 6804-1
Revision r4c84bd03f7df (s390x; channels: edge, latest, 6.1-23.10_beta)
* libc-bin: 6804-1
* libc6: 6804-1
Revision r60565ba58b1e (ppc64le; channels: 4.10-20.04_edge, 4.10-20.04_beta)
* libc-bin: 6804-1
* libc6: 6804-1
Revision r82ff3aa037a6 (s390x; channels: 5.2-22.04_beta)
* libc-bin: 6804-1
* libc6: 6804-1
Revision r83d35526d967 (amd64; channels: edge, latest, 6.1-23.10_beta)
* libc-bin: 6804-1
* libc6: 6804-1
Revision ra9475cbb9bf0 (arm64; channels: 5.2-22.04_beta)
* libc-bin: 6804-1
* libc6: 6804-1
Revision rab9472d73db0 (amd64; channels: 5.2-22.04_beta)
* libc-bin: 6804-1
* libc6: 6804-1
Revision radbdd9ef8203 (arm64; channels: edge, latest, 6.1-23.10_beta)
* libc-bin: 6804-1
* libc6: 6804-1
Revision re53c03f08b17 (s390x; channels: 4.10-20.04_edge, 4.10-20.04_beta)
* libc-bin: 6804-1
* libc6: 6804-1
Revision reed50142969e (arm64; channels: 4.10-20.04_edge, 4.10-20.04_beta)
* libc-bin: 6804-1
* libc6: 6804-1
Revision rfa2a24b3d71e (ppc64le; channels: edge, latest, 6.1-23.10_beta)
* libc-bin: 6804-1
* libc6: 6804-1
Simply rebuilding the rock will pull in the new security updates and
resolve this. If your rock also contains vendored code, now might be a
good time to review it for any needed updates.
Thank you for your rock and for attending to this matter.
References:
* https://ubuntu.com/security/notices/USN-6804-1/
Follow ups