This bug was fixed in the package docker.io - 1.6.2~dfsg1-1ubuntu4~14.04.1 --------------- docker.io (1.6.2~dfsg1-1ubuntu4~14.04.1) trusty; urgency=medium
* Backport to Ubuntu 14.04 (LP: #1454719). * Disabled - d/p/lxc.autodev-support.patch to minimise regression risk as it is not relevant for the version of LXC on Trusty (1.0.3-0ubuntu3). - d/p/update-go.net-golang.org.patch: there has been a url canonical name change upstream, but keeping this patch on involves backporting golang to 1.4 which is undesirable for this backport (golang-go.net-dev needs golang-x-text, which does not build successfully without a 1.4 backport). - Wily related fixes: + d/p/golang-1.5-wily.patch to fix FTBFS with golang-1.5 build on wily + d/p/ppc64el-wily.patch to fix ppc64le FTBFS on wily (LP: #1488668) + d/p/libcontainer_arm64_syscall_dup2_to_dup3-c_changes.patch (LP: #1488669) + d/p/libcontainer_arm64_syscall_dup2_to_dup3-golang_changes.patch (LP: #1488669) + d/rules to build with golang-go on arm64 (LP: #1488669) + d/control to build with golang-go on arm64 (LP: #1488669) * Reverted: d/rules: http://anonscm.debian.org/cgit/docker/docker.io.git/diff/?id=b1458f5 commit to preserve docker.io symlink. -- Pierre-André MOREY <pierre-andre.mo...@canonical.com> Tue, 22 Sep 2015 13:47:53 +0200 ** Changed in: docker.io (Ubuntu Trusty) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1396572 Title: Critcial security vulnerabilties in docker < 1.3.3 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/docker.io/+bug/1396572/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs