On Wednesday, June 02 2021, I wrote: > On Wednesday, June 02 2021, nore...@canonical.com wrote: > >> A scan of this rock shows that it was built with packages from the Ubuntu >> archive that have since received security updates. The following lists new >> USNs for affected binary packages in each rock revision: >> >> Revision r14a331b4066a (ppc64el; channels: 12-20.04_edge, 12-20.04_beta) >> * postgresql-12: 4972-1 >> * postgresql-client-12: 4972-1 >> >> Revision r1bb6d8f2737f (s390x; channels: 12-20.04_edge, 12-20.04_beta) >> * postgresql-12: 4972-1 >> * postgresql-client-12: 4972-1 >> >> Revision r82705063e47a (amd64; channels: 12-20.04_edge, 12-20.04_beta) >> * postgresql-12: 4972-1 >> * postgresql-client-12: 4972-1 >> >> Revision rb239155417dc (arm64; channels: 12-20.04_edge, 12-20.04_beta) >> * postgresql-12: 4972-1 >> * postgresql-client-12: 4972-1 >> >> Simply rebuilding the rock will pull in the new security updates and >> resolve this. If your rock also contains vendored code, now might be a >> good time to review it for any needed updates. >> >> Thank you for your rock and for attending to this matter. >> >> References: >> * https://ubuntu.com/security/notices/USN-4972-1/ > > FWIW I got this email today from the security and I'm already acting on > it.
This has now been built, uploaded and tagged. -- Sergio GPG key ID: E92F D0B3 6B14 F1F4 D8E0 EB2F 106D A1C8 C3CB BF14 -- Mailing list: https://launchpad.net/~ubuntu-docker-images Post to : ubuntu-docker-images@lists.launchpad.net Unsubscribe : https://launchpad.net/~ubuntu-docker-images More help : https://help.launchpad.net/ListHelp