On Friday, September 16 2022, security-team-toolbox-...@canonical.com wrote:
> A scan of this rock shows that it was built with packages from the Ubuntu > archive that have since received security updates. The following lists new > USNs for affected binary packages in each rock revision: > > Revision r13871dd79334 (ppc64le; channels: 2.4-20.04_edge, 2.4-20.04_beta) > * libsqlite3-0: 5615-1 > > Revision r3f525a93d8aa (amd64; channels: 2.4-20.04_edge, 2.4-20.04_beta) > * libsqlite3-0: 5615-1 > > Revision r6d4e4c57f069 (arm64; channels: 2.4-20.04_edge, 2.4-20.04_beta) > * libsqlite3-0: 5615-1 > > Revision rf8f9ec7b464d (s390x; channels: 2.4-20.04_edge, 2.4-20.04_beta) > * libsqlite3-0: 5615-1 > > Simply rebuilding the rock will pull in the new security updates and > resolve this. If your rock also contains vendored code, now might be a > good time to review it for any needed updates. > > Thank you for your rock and for attending to this matter. > > References: > * https://ubuntu.com/security/notices/USN-5615-1/ This image has been rebuilt and retagged. -- Sergio GPG key ID: E92F D0B3 6B14 F1F4 D8E0 EB2F 106D A1C8 C3CB BF14 -- Mailing list: https://launchpad.net/~ubuntu-docker-images Post to : ubuntu-docker-images@lists.launchpad.net Unsubscribe : https://launchpad.net/~ubuntu-docker-images More help : https://help.launchpad.net/ListHelp