[Bug 2142] openssh sandboxing using libseccomp

bugzilla-daemon at bugzilla.mindrot.org bugzilla-daemon at bugzilla.mindrot.org
Wed Jan 4 01:48:31 AEDT 2017


https://bugzilla.mindrot.org/show_bug.cgi?id=2142

Colin Watson <cjwatson at debian.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |cjwatson at debian.org

--- Comment #10 from Colin Watson <cjwatson at debian.org> ---
Created attachment 2927
  --> https://bugzilla.mindrot.org/attachment.cgi?id=2927&action=edit
Work around clock_gettime kernel bug on Linux x32

Here's an alternative patch that fixes the seccomp sandbox on Linux
x32.  It's working around what I consider to be a kernel bug (reported
in Debian and we'll see where it goes), so I don't know what you'll
make of this, but it's reasonably unobtrusive as workarounds go.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.


More information about the openssh-bugs mailing list