ubuntu-docker-images team mailing list archive
-
ubuntu-docker-images team
-
Mailing list archive
-
Message #01017
memcached contains outdated Ubuntu packages
-
To:
rocks@xxxxxxxxxxxxx, sergio.durigan@xxxxxxxxxxxxx, athos.ribeiro@xxxxxxxxxxxxx, carl.csaposs@xxxxxxxxxxxxx, dragomir.penev@xxxxxxxxxxxxx, jose.masson@xxxxxxxxxxxxx, leon.mintz@xxxxxxxxxxxxx, paulo.machado@xxxxxxxxxxxxx, simon.aronsson@xxxxxxxxxxxxx, ubuntu-docker-images@xxxxxxxxxxxxxxxxxxx
-
From:
security-team-toolbox-bot@xxxxxxxxxxxxx
-
Date:
Fri, 07 Feb 2025 03:39:48 -0000
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r1995da8f0e23 (s390x; channels: 1.5-20.04_beta)
* libc-bin: 7259-1
* libc6: 7259-1
Revision r290d923f0167 (amd64; channels: 1.6-22.04_beta)
* libc-bin: 7259-1
* libc6: 7259-1
* libgssapi-krb5-2: 7257-1
* libk5crypto3: 7257-1
* libkrb5-3: 7257-1
* libkrb5support0: 7257-1
Revision r40be24e811ba (arm64; channels: 1.6-24.10_edge)
* libc-bin: 7259-1
* libc6: 7259-1
Revision r477339484d1b (arm64; channels: latest, edge)
* libc-bin: 7259-1
* libc6: 7259-1
Revision r85593b7090dd (ppc64le; channels: latest, edge)
* libc-bin: 7259-1
* libc6: 7259-1
Revision r8d42a36fccb8 (ppc64le; channels: 1.6-24.10_edge)
* libc-bin: 7259-1
* libc6: 7259-1
Revision rae9ce5735ad7 (amd64; channels: 1.6-24.10_edge)
* libc-bin: 7259-1
* libc6: 7259-1
Revision rb0ff59b5e533 (s390x; channels: 1.6-22.04_beta)
* libc-bin: 7259-1
* libc6: 7259-1
* libgssapi-krb5-2: 7257-1
* libk5crypto3: 7257-1
* libkrb5-3: 7257-1
* libkrb5support0: 7257-1
Revision rbc16e0e51138 (s390x; channels: latest, edge)
* libc-bin: 7259-1
* libc6: 7259-1
Revision rbd109b60a928 (arm64; channels: 1.5-20.04_beta)
* libc-bin: 7259-1
* libc6: 7259-1
Revision rc56a7e9b059c (ppc64le; channels: 1.6-22.04_beta)
* libc-bin: 7259-1
* libc6: 7259-1
* libgssapi-krb5-2: 7257-1
* libk5crypto3: 7257-1
* libkrb5-3: 7257-1
* libkrb5support0: 7257-1
Revision rc7b3a02e3e5a (ppc64le; channels: 1.5-20.04_beta)
* libc-bin: 7259-1
* libc6: 7259-1
Revision re7e567750d6d (arm64; channels: 1.6-22.04_beta)
* libc-bin: 7259-1
* libc6: 7259-1
* libgssapi-krb5-2: 7257-1
* libk5crypto3: 7257-1
* libkrb5-3: 7257-1
* libkrb5support0: 7257-1
Revision rf37bdb83fede (s390x; channels: 1.6-24.10_edge)
* libc-bin: 7259-1
* libc6: 7259-1
Revision rf6dcbd6b619f (amd64; channels: 1.5-20.04_beta)
* libc-bin: 7259-1
* libc6: 7259-1
Revision rf90b4f21889e (amd64; channels: latest, edge)
* libc-bin: 7259-1
* libc6: 7259-1
Simply rebuilding the rock will pull in the new security updates and
resolve this. If your rock also contains vendored code, now might be a
good time to review it for any needed updates.
Thank you for your rock and for attending to this matter.
References:
* https://ubuntu.com/security/notices/USN-7257-1/
* https://ubuntu.com/security/notices/USN-7259-1/