Date: Sat, 03 Jun 2017 08:39:19 -0400 From: Daniel Micay <danielmicay@...il.com> To: oss-security@...ts.openwall.com Subject: Re: Linux kernel: stack buffer overflow with controlled payload in get_options() function > The lockdown patches would be useful if they were complete In the context of filling holes in containment of root based on namespaces / chroots / MAC, where they can already be useful today. Not as something that's independently useful, especially when it's known to not be complete without other isolation primitives...
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ