[Bug 2142] openssh sandboxing using libseccomp
bugzilla-daemon at bugzilla.mindrot.org
bugzilla-daemon at bugzilla.mindrot.org
Wed Jan 4 01:48:31 AEDT 2017
https://bugzilla.mindrot.org/show_bug.cgi?id=2142
Colin Watson <cjwatson at debian.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |cjwatson at debian.org
--- Comment #10 from Colin Watson <cjwatson at debian.org> ---
Created attachment 2927
--> https://bugzilla.mindrot.org/attachment.cgi?id=2927&action=edit
Work around clock_gettime kernel bug on Linux x32
Here's an alternative patch that fixes the seccomp sandbox on Linux
x32. It's working around what I consider to be a kernel bug (reported
in Debian and we'll see where it goes), so I don't know what you'll
make of this, but it's reasonably unobtrusive as workarounds go.
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
More information about the openssh-bugs
mailing list