[PATCH 0/2][T/V/X/Y SRU] Updated fix for CVE-2015-8709

Seth Forshee seth.forshee at canonical.com
Wed Nov 9 12:57:57 UTC 2016


On Wed, Nov 09, 2016 at 10:26:01AM +0000, Luis Henriques wrote:
> On Wed, Nov 09, 2016 at 09:24:36AM +0000, Colin Ian King wrote:
> > On 09/11/16 03:46, Seth Forshee wrote:
> > > These patches replace our sauce patch for CVE-2015-8709 with a patch
> > > from linux-next which fixes the issue. The upstream patch better
> > > protects against ptracing a process which has entered a user namespace
> > > by processes within that namespace, thus we should replace our patch
> > > with the upstream fix.
> > > 
> > > Thanks,
> > > Seth
> > > 
> > There were no Buglink bug numbers in the sauce patches.
> 
> Yep.  I believe that would be https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1639345

I thought we didn't need bug links in CVE patches anymore?




More information about the kernel-team mailing list