@framstag I'm going to assume that canonical is going to make some noise to let people know that they'll need manual intervention? Beyond spreading the word there's not much else that can be done.
-- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to eglibc in Ubuntu. https://bugs.launchpad.net/bugs/1352504 Title: Regression in 2.11.1-0ubuntu7.14; segfault in getservbyname Status in “eglibc” package in Ubuntu: Invalid Status in “eglibc” source package in Lucid: Confirmed Status in “eglibc” source package in Precise: Invalid Status in “eglibc” source package in Trusty: Invalid Status in “eglibc” source package in Utopic: Invalid Bug description: After taking security updates to 2.11.1-0ubuntu7.14 on Lucid, calls to getservbyname() are causing segfaults; backtrace attached. I suspect a failure in debian/patches/any/CVE-2013-4357.diff nscd is installed and in use as a caching layer for openldap, which use used for passwd, group, and shadow but not services. Needless to say, a security update that causes a regression which makes 'apt-get' segfault is quite unfortunate. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/eglibc/+bug/1352504/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp