-
Notifications
You must be signed in to change notification settings - Fork 12
Open
Description
We received the following automated email from Canonical today:
A scan of this snap shows that it was built with packages from the Ubuntu
archive that have since received security updates. The following lists new
USNs for affected binary packages in each snap revision:
Revision r1248 (amd64; channels: stable, candidate)
- binutils: 7306-1
- binutils-common: 7306-1
- binutils-x86-64-linux-gnu: 7306-1
- git: 7207-1
- git-man: 7207-1
- libbinutils: 7306-1
- libc-dev-bin: 7259-1
- libc6-dev: 7259-1
- libctf-nobfd0: 7306-1
- libctf0: 7306-1
- libharfbuzz0b: 7251-1
- libmysqlclient21: 7245-1
- libopenjp2-7: 7223-1
- libpoppler118: 7213-1
- libpq5: 7315-1
- libpython3.10: 7218-1, 7280-1
- libpython3.10-dev: 7218-1, 7280-1
- libpython3.10-minimal: 7218-1, 7280-1
- libpython3.10-stdlib: 7218-1, 7280-1
- libsndfile1: 7273-1
- libxml2: 7240-1, 7302-1
- python3.10-dev: 7218-1, 7280-1
Simply rebuilding the snap will pull in the new security updates and
resolve this. If your snap also contains vendored code, now might be a
good time to review it for any needed updates.
Thank you for your snap and for attending to this matter.
References:
- https://ubuntu.com/security/notices/USN-7207-1/
- https://ubuntu.com/security/notices/USN-7213-1/
- https://ubuntu.com/security/notices/USN-7218-1/
- https://ubuntu.com/security/notices/USN-7223-1/
- https://ubuntu.com/security/notices/USN-7240-1/
- https://ubuntu.com/security/notices/USN-7245-1/
- https://ubuntu.com/security/notices/USN-7251-1/
- https://ubuntu.com/security/notices/USN-7259-1/
- https://ubuntu.com/security/notices/USN-7273-1/
- https://ubuntu.com/security/notices/USN-7280-1/
- https://ubuntu.com/security/notices/USN-7302-1/
- https://ubuntu.com/security/notices/USN-7306-1/
- https://ubuntu.com/security/notices/USN-7315-1/
Metadata
Metadata
Assignees
Labels
No labels