Rebuilt and rettaged!
On Tue, Nov 8, 2022 at 2:15 AM
wrote:
> A scan of this rock shows that it was built with packages from the Ubuntu
> archive that have since received security updates. The following lists new
> USNs for affected binary packages in each rock revision:
>
> Revision r0628806263
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r062880626352 (ppc64le; channels: 12-20.04_edge, 12-20.04_beta)
* libsqlite3-0: 57
Images were rebuilt and rettaged.
On Wed, Nov 2, 2022 at 2:15 AM
wrote:
> A scan of this rock shows that it was built with packages from the Ubuntu
> archive that have since received security updates. The following lists new
> USNs for affected binary packages in each rock revision:
>
> Revision
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r4cae3e6c942a (arm64; channels: edge, 14-22.04_edge, 14-22.04_beta,
latest)
* lib
Rebuilt and retagged!
On Thu, Oct 20, 2022 at 2:16 AM
wrote:
> A scan of this rock shows that it was built with packages from the Ubuntu
> archive that have since received security updates. The following lists new
> USNs for affected binary packages in each rock revision:
>
> Revision r0a60adaa6
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r0a60adaa6fa8 (amd64; channels: edge, 14-22.04_edge, 14-22.04_beta,
latest)
* lib
Rebuild and retagged!
On Tue, Oct 18, 2022 at 2:15 AM
wrote:
> A scan of this rock shows that it was built with packages from the Ubuntu
> archive that have since received security updates. The following lists new
> USNs for affected binary packages in each rock revision:
>
> Revision r167c31e7b
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r167c31e7b5f9 (arm64; channels: 14-22.04_edge, 14-22.04_beta, latest,
edge)
* zli
These images were rebuilt and retagged.
On Thu, Oct 13, 2022 at 2:13 AM
wrote:
> A scan of this rock shows that it was built with packages from the Ubuntu
> archive that have since received security updates. The following lists new
> USNs for affected binary packages in each rock revision:
>
> R
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r68bce6d75f8f (s390x; channels: 12-20.04_edge, 12-20.04_beta)
* libgmp10: 5672-1
Images were rebuilt and re-tagged!
On Fri, Sep 23, 2022 at 2:13 AM
wrote:
> A scan of this rock shows that it was built with packages from the Ubuntu
> archive that have since received security updates. The following lists new
> USNs for affected binary packages in each rock revision:
>
> Revisi
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r776fef42565c (amd64; channels: edge, latest, 14-22.04_edge,
14-22.04_beta)
* lib
On Friday, September 16 2022, security-team-toolbox-...@canonical.com wrote:
> A scan of this rock shows that it was built with packages from the Ubuntu
> archive that have since received security updates. The following lists new
> USNs for affected binary packages in each rock revision:
>
> Revis
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r58fecdb26d67 (s390x; channels: 12-20.04_edge, 12-20.04_beta)
* libsqlite3-0: 5615
These images were re-built and re-tagged!
On Tue, Aug 23, 2022 at 2:13 AM
wrote:
> A scan of this rock shows that it was built with packages from the Ubuntu
> archive that have since received security updates. The following lists new
> USNs for affected binary packages in each rock revision:
>
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r19bb40d2e74b (s390x; channels: edge, 14-22.04_beta, latest,
14-22.04_edge)
* lib
All images were re-built and re-tagged.
On Fri, Aug 19, 2022 at 2:12 AM
wrote:
> A scan of this rock shows that it was built with packages from the Ubuntu
> archive that have since received security updates. The following lists new
> USNs for affected binary packages in each rock revision:
>
>
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r3bfe92275cdb (amd64; channels: 12-20.04_beta, 12-20.04_edge)
* libpq5: 5571-1
*
These images were re-built and re-tagged.
On Fri, Aug 5, 2022 at 2:15 AM
wrote:
> A scan of this rock shows that it was built with packages from the Ubuntu
> archive that have since received security updates. The following lists new
> USNs for affected binary packages in each rock revision:
>
>
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r0589ab4da16b (arm64; channels: latest, edge, 14-22.04_beta,
14-22.04_edge)
* lib
These images were re-built and re-tagged.
On Fri, Jul 29, 2022 at 2:14 AM
wrote:
> A scan of this rock shows that it was built with packages from the Ubuntu
> archive that have since received security updates. The following lists new
> USNs for affected binary packages in each rock revision:
>
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r8134b0c79b93 (arm64; channels: 14-22.04_edge, 14-22.04_beta, latest,
edge)
* lib
Hello,
Images were rebuilt and tagged in the registries.
Thanks
On Wed, Jun 8, 2022 at 2:13 AM
wrote:
> A scan of this rock shows that it was built with packages from the Ubuntu
> archive that have since received security updates. The following lists new
> USNs for affected binary packages in
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r034d38231599 (amd64; channels: 12-20.04_beta, 12-20.04_edge)
* e2fsprogs: 5464-1
On Tue, May 31, 2022 at 01:30:02PM +0200, Valentin Viennot wrote:
Are we (and if not, how could we be) redirecting these alerts to the teams
now in control? (or is the handover still going on?)
Hi!
The handover process is still in progress.
These last few security alerts were not being emaile
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r034d38231599 (amd64; channels: 12-20.04_edge)
* dpkg: 5446-1
Revision r122308f39
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
Revision r122308f39e56 (ppc64le; channels: edge, 14-22.04_edge, 14-22.04_beta,
latest)
* l
On Wed, Apr 27, 2022 at 10:16:16PM -0700,
security-team-toolbox-...@canonical.com wrote:
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
On Wed, Apr 20, 2022 at 10:24:53PM -0700,
security-team-toolbox-...@canonical.com wrote:
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
On Wed, Apr 13, 2022 at 10:12:31PM -0700,
security-team-toolbox-...@canonical.com wrote:
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
On Wed, Mar 30, 2022 at 10:09:38PM -0700,
security-team-toolbox-...@canonical.com wrote:
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
On Tue, Mar 15, 2022 at 10:09:55PM -0700,
security-team-toolbox-...@canonical.com wrote:
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
On Mon, Mar 14, 2022 at 10:09:33PM -0700,
security-team-toolbox-...@canonical.com wrote:
A scan of this rock shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each rock revision:
On Wednesday, March 02 2022, security-team-toolbox-...@canonical.com wrote:
> A scan of this rock shows that it was built with packages from the Ubuntu
> archive that have since received security updates. The following lists new
> USNs for affected binary packages in each rock revision:
>
> Revisi
On Wednesday, February 23 2022, security-team-toolbox-...@canonical.com wrote:
> A scan of this rock shows that it was built with packages from the Ubuntu
> archive that have since received security updates. The following lists new
> USNs for affected binary packages in each rock revision:
>
> Rev
On Friday, November 12 2021, security-team-toolbox-...@canonical.com wrote:
> A scan of this rock shows that it was built with packages from the Ubuntu
> archive that have since received security updates. The following lists new
> USNs for affected binary packages in each rock revision:
>
> Revisi
On Friday, September 17 2021, Emilia Torino wrote:
> Hey all,
Hey Emi,
> Yesterday we fixed a bug in the review-tools which was preventing some
> security notices to be reported. The service was not properly
> considering the arch qualifier in a binary name (e.g. liblz4-1:amd64)
> and thus it wa
Hey all,
Yesterday we fixed a bug in the review-tools which was preventing some
security notices to be reported. The service was not properly
considering the arch qualifier in a binary name (e.g. liblz4-1:amd64)
and thus it was failing to match USNs affecting such binary:
https://code.launchpad.ne
On Wednesday, August 25 2021, security-team-toolbox-...@canonical.com wrote:
> A scan of this rock shows that it was built with packages from the Ubuntu
> archive that have since received security updates. The following lists new
> USNs for affected binary packages in each rock revision:
>
> Revis
Awesome, thank you Sergio!
On Wed, Jun 2, 2021 at 2:31 PM Sergio Durigan Junior
wrote:
>
> On Wednesday, June 02 2021, I wrote:
>
> > On Wednesday, June 02 2021, nore...@canonical.com wrote:
> >
> >> A scan of this rock shows that it was built with packages from the Ubuntu
> >> archive that have
On Wednesday, June 02 2021, I wrote:
> On Wednesday, June 02 2021, nore...@canonical.com wrote:
>
>> A scan of this rock shows that it was built with packages from the Ubuntu
>> archive that have since received security updates. The following lists new
>> USNs for affected binary packages in each
On Wed, Jun 02, 2021 at 10:13:05AM -0400, Rick Harding wrote:
> On Wed, Jun 2, 2021 at 10:08 AM Sergio Durigan Junior
> wrote:
>
> > I've just ping'ed Emi to check if there are any news about getting these
> > notifications sent to this list. I'm also going to ask her to
> > explicitly add Athos
On Wednesday, June 02 2021, Rick Harding wrote:
> On Wed, Jun 2, 2021 at 10:08 AM Sergio Durigan Junior
> wrote:
>
>> I've just ping'ed Emi to check if there are any news about getting these
>> notifications sent to this list. I'm also going to ask her to
>> explicitly add Athos and Bryce to the
On Wed, Jun 2, 2021 at 10:08 AM Sergio Durigan Junior
wrote:
> I've just ping'ed Emi to check if there are any news about getting these
> notifications sent to this list. I'm also going to ask her to
> explicitly add Athos and Bryce to the Cc list of these emails.
Should they just subscribe to
On Wednesday, June 02 2021, nore...@canonical.com wrote:
> A scan of this rock shows that it was built with packages from the Ubuntu
> archive that have since received security updates. The following lists new
> USNs for affected binary packages in each rock revision:
>
> Revision r14a331b4066a (p
45 matches
Mail list logo