CVE-2016-1234 Has been addressed in Ubuntu 14.04 LTS in 2.19-0ubuntu6.10
as part of http://www.ubuntu.com/usn/usn-3239-1 . Marking the eglibc
task as closed.

Thanks!

** Changed in: eglibc (Ubuntu)
       Status: New => Fix Released

** Changed in: eglibc (Ubuntu)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to eglibc in Ubuntu.
https://bugs.launchpad.net/bugs/1597881

Title:
  Fix for CVE-2016-1234 in Ubuntu for eglibc 2.15-0ubuntu10.15

Status in Juniper Openstack:
  In Progress
Status in Juniper Openstack r2.20 series:
  In Progress
Status in Juniper Openstack r2.22.x series:
  In Progress
Status in Juniper Openstack r3.0 series:
  In Progress
Status in Juniper Openstack trunk series:
  In Progress
Status in eglibc package in Ubuntu:
  Fix Released

Bug description:
  CVE-2016-1234 has to be fixed for eglibc 2.15-0ubuntu10.15

  I have found Debian guys have patched this in wheezy
  (https://packages.debian.org/wheezy/all/eglibc-source/download)  which
  is on 2.13 , Couldn't find this for 2-15 in Ubuntu repositories.

To manage notifications about this bug go to:
https://bugs.launchpad.net/juniperopenstack/+bug/1597881/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to