[Bug 2142] openssh sandboxing using libseccomp

bugzilla-daemon at bugzilla.mindrot.org bugzilla-daemon at bugzilla.mindrot.org
Tue Mar 14 18:00:25 AEDT 2017


https://bugzilla.mindrot.org/show_bug.cgi?id=2142

Damien Miller <djm at mindrot.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Attachment #2927|0                           |1
        is obsolete|                            |
   Attachment #2962|                            |ok?(dtucker at zip.com.au)
              Flags|                            |

--- Comment #11 from Damien Miller <djm at mindrot.org> ---
Created attachment 2962
  --> https://bugzilla.mindrot.org/attachment.cgi?id=2962&action=edit
updated diff

I've refactored that file a bit to make the manual expansion of
SC_ALLOW() unnecessary here. Here's an updated and simpler diff that
just allows the clock_gettime syscall with the X32 bit masked off.

-- 
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.


More information about the openssh-bugs mailing list