CVE-2016-1234 Has been addressed in Ubuntu 14.04 LTS in 2.19-0ubuntu6.10 as part of http://www.ubuntu.com/usn/usn-3239-1 . Marking the eglibc task as closed.
Thanks! ** Changed in: eglibc (Ubuntu) Status: New => Fix Released ** Changed in: eglibc (Ubuntu) Importance: Undecided => Low -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to eglibc in Ubuntu. https://bugs.launchpad.net/bugs/1597881 Title: Fix for CVE-2016-1234 in Ubuntu for eglibc 2.15-0ubuntu10.15 Status in Juniper Openstack: In Progress Status in Juniper Openstack r2.20 series: In Progress Status in Juniper Openstack r2.22.x series: In Progress Status in Juniper Openstack r3.0 series: In Progress Status in Juniper Openstack trunk series: In Progress Status in eglibc package in Ubuntu: Fix Released Bug description: CVE-2016-1234 has to be fixed for eglibc 2.15-0ubuntu10.15 I have found Debian guys have patched this in wheezy (https://packages.debian.org/wheezy/all/eglibc-source/download) which is on 2.13 , Couldn't find this for 2-15 in Ubuntu repositories. To manage notifications about this bug go to: https://bugs.launchpad.net/juniperopenstack/+bug/1597881/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp