These images were re-built and re-tagged. On Fri, Aug 5, 2022 at 2:15 AM <security-team-toolbox-...@canonical.com> wrote:
> A scan of this rock shows that it was built with packages from the Ubuntu > archive that have since received security updates. The following lists new > USNs for affected binary packages in each rock revision: > > Revision r14f9bc24d88c (amd64; channels: 8.0-20.04_edge, 8.0-20.04_beta) > * libgnutls30: 5550-1 > > Revision r23d9ba64ea5e (ppc64le; channels: latest, edge, 8.0-22.04_edge, > 8.0-22.04_beta) > * libgnutls30: 5550-1 > > Revision r5313b2800869 (arm64; channels: latest, edge, 8.0-22.04_edge, > 8.0-22.04_beta) > * libgnutls30: 5550-1 > > Revision r54ef095de224 (arm64; channels: 8.0-20.04_edge, 8.0-20.04_beta) > * libgnutls30: 5550-1 > > Revision r60e049c53b54 (s390x; channels: latest, edge, 8.0-22.04_edge, > 8.0-22.04_beta) > * libgnutls30: 5550-1 > > Revision r97cb916ddc92 (amd64; channels: latest, edge, 8.0-22.04_edge, > 8.0-22.04_beta) > * libgnutls30: 5550-1 > > Revision r9bc38eb1923c (s390x; channels: 8.0-20.04_edge, 8.0-20.04_beta) > * libgnutls30: 5550-1 > > Revision rf120c8ca217f (ppc64le; channels: 8.0-20.04_edge, 8.0-20.04_beta) > * libgnutls30: 5550-1 > > Simply rebuilding the rock will pull in the new security updates and > resolve this. If your rock also contains vendored code, now might be a > good time to review it for any needed updates. > > Thank you for your rock and for attending to this matter. > > References: > * https://ubuntu.com/security/notices/USN-5550-1/ >
-- Mailing list: https://launchpad.net/~ubuntu-docker-images Post to : ubuntu-docker-images@lists.launchpad.net Unsubscribe : https://launchpad.net/~ubuntu-docker-images More help : https://help.launchpad.net/ListHelp