[PATCH 0/2][T/V/X/Y SRU] Updated fix for CVE-2015-8709
Colin Ian King
colin.king at canonical.com
Wed Nov 9 09:24:36 UTC 2016
On 09/11/16 03:46, Seth Forshee wrote:
> These patches replace our sauce patch for CVE-2015-8709 with a patch
> from linux-next which fixes the issue. The upstream patch better
> protects against ptracing a process which has entered a user namespace
> by processes within that namespace, thus we should replace our patch
> with the upstream fix.
There were no Buglink bug numbers in the sauce patches.
More information about the kernel-team