[Bug 2142] openssh sandboxing using libseccomp
bugzilla-daemon at bugzilla.mindrot.org
bugzilla-daemon at bugzilla.mindrot.org
Tue Mar 14 18:00:25 AEDT 2017
https://bugzilla.mindrot.org/show_bug.cgi?id=2142
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #2927|0 |1
is obsolete| |
Attachment #2962| |ok?(dtucker at zip.com.au)
Flags| |
--- Comment #11 from Damien Miller <djm at mindrot.org> ---
Created attachment 2962
--> https://bugzilla.mindrot.org/attachment.cgi?id=2962&action=edit
updated diff
I've refactored that file a bit to make the manual expansion of
SC_ALLOW() unnecessary here. Here's an updated and simpler diff that
just allows the clock_gettime syscall with the X32 bit masked off.
--
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
More information about the openssh-bugs
mailing list