FYI, >=16.10 has libseccomp >= 2.3. xenial has 2.2.3-3ubuntu3 that
includes updated syscall tables for this (https://bugs.debian.org/cgi-
bin/bugreport.cgi?bug=809556 and
https://bugs.launchpad.net/ubuntu/+source/libseccomp/+bug/1554098).

>=16.04 have 4.4 kernels and updated glibc.

** Bug watch added: Debian Bug tracker #809556
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809556

** Changed in: libseccomp (Ubuntu)
     Assignee: Jamie Strandboge (jdstrand) => (unassigned)

** Changed in: libseccomp (Ubuntu)
       Status: Confirmed => Fix Released

** Changed in: libseccomp (Ubuntu Xenial)
       Status: New => Fix Released

** Changed in: libseccomp (Ubuntu Trusty)
       Status: New => Triaged

** Changed in: glibc (Ubuntu Trusty)
       Status: New => Triaged

** Changed in: glibc (Ubuntu)
       Status: Confirmed => Fix Released

** Changed in: glibc (Ubuntu Xenial)
       Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1576066

Title:
  32bit glibc calls old socketcall() syscall, causing seccomp problems

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1576066/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to