On Thu, 28 Jul 2016, Kees Cook wrote:
> On Mon, Jul 11, 2016 at 6:59 PM, Kees Cook wrote:
> > On Mon, Jul 11, 2016 at 5:56 PM, Mickaël Salaün wrote:
> >> Hi,
> >>
> >> This series fix the recent seccomp update for the User-mode Linux
> >> architecture
>
On Thu, 28 Jul 2016, Kees Cook wrote:
> On Mon, Jul 11, 2016 at 6:59 PM, Kees Cook wrote:
> > On Mon, Jul 11, 2016 at 5:56 PM, Mickaël Salaün wrote:
> >> Hi,
> >>
> >> This series fix the recent seccomp update for the User-mode Linux
> >> architecture
> >> (32-bit and 64-bit) since commit
On Mon, Jul 11, 2016 at 6:59 PM, Kees Cook wrote:
> On Mon, Jul 11, 2016 at 5:56 PM, Mickaël Salaün wrote:
>> Hi,
>>
>> This series fix the recent seccomp update for the User-mode Linux
>> architecture
>> (32-bit and 64-bit) since commit
On Mon, Jul 11, 2016 at 6:59 PM, Kees Cook wrote:
> On Mon, Jul 11, 2016 at 5:56 PM, Mickaël Salaün wrote:
>> Hi,
>>
>> This series fix the recent seccomp update for the User-mode Linux
>> architecture
>> (32-bit and 64-bit) since commit 26703c636c1f3272b39bd0f6d04d2e970984f1b6
>> (close the
On Mon, Jul 11, 2016 at 5:56 PM, Mickaël Salaün wrote:
> Hi,
>
> This series fix the recent seccomp update for the User-mode Linux architecture
> (32-bit and 64-bit) since commit 26703c636c1f3272b39bd0f6d04d2e970984f1b6
> (close the hole where ptrace can change a syscall out
On Mon, Jul 11, 2016 at 5:56 PM, Mickaël Salaün wrote:
> Hi,
>
> This series fix the recent seccomp update for the User-mode Linux architecture
> (32-bit and 64-bit) since commit 26703c636c1f3272b39bd0f6d04d2e970984f1b6
> (close the hole where ptrace can change a syscall out from under seccomp).
Hi,
This series fix the recent seccomp update for the User-mode Linux architecture
(32-bit and 64-bit) since commit 26703c636c1f3272b39bd0f6d04d2e970984f1b6
(close the hole where ptrace can change a syscall out from under seccomp).
Regards,
Mickaël Salaün (3):
um/ptrace: Fix the
Hi,
This series fix the recent seccomp update for the User-mode Linux architecture
(32-bit and 64-bit) since commit 26703c636c1f3272b39bd0f6d04d2e970984f1b6
(close the hole where ptrace can change a syscall out from under seccomp).
Regards,
Mickaël Salaün (3):
um/ptrace: Fix the
8 matches
Mail list logo