Yes, I understand that glibc is a critical piece and we need to do the upgrade carefully.
With my customer, we tested with several ubuntu versions:
ubuntu 14.04: glibc 2.19: OK
ubuntu 16.04: glibc 2.23: OK
ubuntu 18.04: glibc 2.27: KO
ubuntu 18.10: glibc 2.28: OK
Only the LTS 18.04 is affected.
The patch I'm looking for has been backported [1] by Glibc upstream project (for good reason) and they are certainly more competent than me to complete the SRU process.
Maybe other patches related to libio can be necessary [2] and there are some patches related to CVE.
I only tested up to the last Debian glibc 2.27 version packaged [3].
Hi Loïc,
You're welcome.
Yes, I understand that glibc is a critical piece and we need to do the upgrade carefully.
With my customer, we tested with several ubuntu versions:
ubuntu 14.04: glibc 2.19: OK
ubuntu 16.04: glibc 2.23: OK
ubuntu 18.04: glibc 2.27: KO
ubuntu 18.10: glibc 2.28: OK
Only the LTS 18.04 is affected.
The patch I'm looking for has been backported [1] by Glibc upstream project (for good reason) and they are certainly more competent than me to complete the SRU process.
Maybe other patches related to libio can be necessary [2] and there are some patches related to CVE.
I only tested up to the last Debian glibc 2.27 version packaged [3].
[1] https:/ /sourceware. org/git/ ?p=glibc. git;a=commitdif f;h=3bb74825740 5e94e13de76573a 4e9da1cfd961d0 /sourceware. org/git/ ?p=glibc. git;a=commitdif f;h=0262507918c fad7223bf81b8f1 62b7adc7a2af01 /salsa. debian. org/glibc- team/glibc/ commit/ 0c8d271ac59dc2e 4ee6bd509d59049 080bd87f76
[2] https:/
[3] https:/
Best regards,
Romain