[PATCH 0/2][T/V/X/Y SRU] Updated fix for CVE-2015-8709

Brad Figg brad.figg at canonical.com
Wed Nov 9 13:14:49 UTC 2016


On Wed, Nov 09, 2016 at 06:57:57AM -0600, Seth Forshee wrote:
> On Wed, Nov 09, 2016 at 10:26:01AM +0000, Luis Henriques wrote:
> > On Wed, Nov 09, 2016 at 09:24:36AM +0000, Colin Ian King wrote:
> > > On 09/11/16 03:46, Seth Forshee wrote:
> > > > These patches replace our sauce patch for CVE-2015-8709 with a patch
> > > > from linux-next which fixes the issue. The upstream patch better
> > > > protects against ptracing a process which has entered a user namespace
> > > > by processes within that namespace, thus we should replace our patch
> > > > with the upstream fix.
> > > > 
> > > > Thanks,
> > > > Seth
> > > > 
> > > There were no Buglink bug numbers in the sauce patches.
> > 
> > Yep.  I believe that would be https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1639345
> 
> I thought we didn't need bug links in CVE patches anymore?

It's just an SRU patch. We need buglinks for all SRU fixes.

Brad

> 
> -- 
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team

-- 
Brad Figg brad.figg at canonical.com http://www.canonical.com




More information about the kernel-team mailing list