[PATCH 0/2][T/V/X/Y SRU] Updated fix for CVE-2015-8709

Seth Forshee seth.forshee at canonical.com
Wed Nov 9 03:46:57 UTC 2016

These patches replace our sauce patch for CVE-2015-8709 with a patch
from linux-next which fixes the issue. The upstream patch better
protects against ptracing a process which has entered a user namespace
by processes within that namespace, thus we should replace our patch
with the upstream fix.


More information about the kernel-team mailing list