This bug was fixed in the package ubuntu-core-launcher - 1.0.20
---------------
ubuntu-core-launcher (1.0.20) xenial; urgency=medium
* don't set NO_NEW_PRIVS. This requires changing privilege dropping since
CAP_SYS_ADMIN is needed with seccomp_load(). This means temporarily
dropping until seccomp_load(), then raising before and permanently
dropping after the filter is applied. As a result, setuid/setgid is
required in all policy (but is still mediated by AppArmor)
- LP: #1560211
-- Jamie Strandboge <[email protected]> Mon, 21 Mar 2016 15:24:33 -0500
** Changed in: ubuntu-core-launcher (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1560211
Title:
execv failed: Operation not permitted
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-core-launcher/+bug/1560211/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs