These images were rebuilt and retagged. On Thu, Oct 13, 2022 at 2:13 AM <[email protected]> wrote:
> A scan of this rock shows that it was built with packages from the Ubuntu > archive that have since received security updates. The following lists new > USNs for affected binary packages in each rock revision: > > Revision r68bce6d75f8f (s390x; channels: 12-20.04_edge, 12-20.04_beta) > * libgmp10: 5672-1 > > Revision r9d4839d39684 (arm64; channels: 12-20.04_edge, 12-20.04_beta) > * libgmp10: 5672-1 > > Revision rcf71de720ceb (ppc64le; channels: 12-20.04_edge, 12-20.04_beta) > * libgmp10: 5672-1 > > Revision re5e4d43a0588 (amd64; channels: 12-20.04_edge, 12-20.04_beta) > * libgmp10: 5672-1 > > Simply rebuilding the rock will pull in the new security updates and > resolve this. If your rock also contains vendored code, now might be a > good time to review it for any needed updates. > > Thank you for your rock and for attending to this matter. > > References: > * https://ubuntu.com/security/notices/USN-5672-1/ >
-- Mailing list: https://launchpad.net/~ubuntu-docker-images Post to : [email protected] Unsubscribe : https://launchpad.net/~ubuntu-docker-images More help : https://help.launchpad.net/ListHelp

