|
Message-ID: <1496493559.21640.7.camel@gmail.com> Date: Sat, 03 Jun 2017 08:39:19 -0400 From: Daniel Micay <danielmicay@...il.com> To: oss-security@...ts.openwall.com Subject: Re: Linux kernel: stack buffer overflow with controlled payload in get_options() function > The lockdown patches would be useful if they were complete In the context of filling holes in containment of root based on namespaces / chroots / MAC, where they can already be useful today. Not as something that's independently useful, especially when it's known to not be complete without other isolation primitives...
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.