This bug was fixed in the package libseccomp - 2.4.3-1ubuntu3.20.04.2
---------------
libseccomp (2.4.3-1ubuntu3.20.04.2) focal; urgency=medium
* Updated to new upstream 2.4.3 version for updated syscalls support
and test-suite robustness
- d/p/add-5.4-local-syscall-headers.patch: Add local copy of the
architecture specific header files which specify system call numbers
from linux-libc-dev in focal to ensure unit tests pass on older
releases where the linux-libc-dev package does not have the required
system calls defined and use these during compilation of unit tests
- d/p/db-properly-reset-attribute-state.patch: Drop this patch since
is now upstream
- LP: #1876055
* Add missing aarch64 system calls
- d/p/fix-aarch64-syscalls.patch
- LP: #1877633
-- Alex Murray <[email protected]> Tue, 02 Jun 2020 14:11:45
+0930
** Changed in: libseccomp (Ubuntu Focal)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876055
Title:
SRU: Backport 2.4.3-1ubuntu3 from groovy to focal/eoan/bionic/xenial
for newer syscalls for core20 base and test suite robustness
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libseccomp/+bug/1876055/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs