CVE-2016-1234 Has been addressed in Ubuntu 14.04 LTS in 2.19-0ubuntu6.10
as part of http://www.ubuntu.com/usn/usn-3239-1 . Marking the eglibc
task as closed.
Thanks!
** Changed in: eglibc (Ubuntu)
Status: New => Fix Released
** Changed in: eglibc (Ubuntu)
Importance: Undecided => Low
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to eglibc in Ubuntu.
https://bugs.launchpad.net/bugs/1597881
Title:
Fix for CVE-2016-1234 in Ubuntu for eglibc 2.15-0ubuntu10.15
Status in Juniper Openstack:
In Progress
Status in Juniper Openstack r2.20 series:
In Progress
Status in Juniper Openstack r2.22.x series:
In Progress
Status in Juniper Openstack r3.0 series:
In Progress
Status in Juniper Openstack trunk series:
In Progress
Status in eglibc package in Ubuntu:
Fix Released
Bug description:
CVE-2016-1234 has to be fixed for eglibc 2.15-0ubuntu10.15
I have found Debian guys have patched this in wheezy
(https://packages.debian.org/wheezy/all/eglibc-source/download) which
is on 2.13 , Couldn't find this for 2-15 in Ubuntu repositories.
To manage notifications about this bug go to:
https://bugs.launchpad.net/juniperopenstack/+bug/1597881/+subscriptions
--
Mailing list: https://launchpad.net/~touch-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~touch-packages
More help : https://help.launchpad.net/ListHelp