On Thu, Jul 28, 2016 at 1:18 PM, "Tóth Attila" wrote:
> Some interesting commits posted recently:
> https://sourceware.org/bugzilla/show_bug.cgi?id=7065#c20
> --
> dr Tóth Attila, Radiológus, 06-20-825-8057
> Attila Toth MD, Radiologist, +36-20-825-8057
>
The fix.. disables it?
On Thu, Jul 28, 2016 at 9:48 PM, Robert Hedrock wrote:
> On Thu, Jul 28, 2016 at 1:18 PM, "Tóth Attila" wrote:
>> Some interesting commits posted recently:
>> https://sourceware.org/bugzilla/show_bug.cgi?id=7065#c20
>> --
>> dr Tóth Attila, Radiológus, 06-20-825-8057
>> Attila Toth MD, Radiologis
http://nvidia.custhelp.com/app/answers/detail/a_id/4208
On Sat, Nov 12, 2016 at 10:45 AM, Robert Sharp
wrote:
>
> There does not appear to be any specific rsyslog selinux package so I assume
> it should all be syslog-related and already in the core policy (although I
> cannot find it there). I also note that Red Hat has a page on setting up
> Rsyslog i
On Mon, Dec 5, 2016 at 12:39 AM, Andrew Savchenko wrote:
> Hi all,
>
> I'd like to know is there any way to protect from kernel
> vulnerabilities like CVE-2016–5195 (mad COW) using hardened
> technologies. (I'm not talking about how to fix this exact CVE, but
> how to protect from similar failures
On Mon, Dec 5, 2016 at 1:45 AM, "Tóth Attila" wrote:
> 2016.December 5.(H) 07:39 időpontban Andrew Savchenko ezt írta:
>> 3) Can some hardware features like Intel TSX be used to protect
>> from such race conditions?
>
> Just a sidenote on TSX: although it sounds procmising, I've been seeing
> mult
Apologies, a combination of a different keyboard and gmail shortcuts
cut that off. I meant to link to:
https://en.wikipedia.org/wiki/Row_hammer.
I expect bugs similar to rowhammer and mad COW to become more
pervasive as architectures shift towards a combination of high core
count, application spec
On Tue, Jul 18, 2017 at 5:34 AM, Alex Efros wrote:
> Hi!
>
> On Fri, Jun 23, 2017 at 12:28:27PM -0400, Anthony G. Basile wrote:
>> My plan then is as follows. I'll wait one more month and then send out
>> a news item and later mask hardened-sources for removal.
>
> Well, it's about a month now. I
On Tue, Jul 18, 2017 at 9:37 AM, R0b0t1 wrote:
> [...] there are this solution seems [...]
I even reread that a few times. My apologies.
ich is the porject's
> mailing list.
>
At this point I am following up here because the issue is time sensitive.
> El 18/08/17 a las 02:59, R0b0t1 escribió:
>> On Tue, Aug 15, 2017 at 3:03 PM, Francisco Blas Izquierdo Riera
>> (klondike) wrote:
>>> El 15/08/17 a
On Wed, Mar 28, 2018 at 12:40 PM, Alex Efros wrote:
> Hi!
>
> On Wed, Mar 28, 2018 at 06:06:00PM +0100, Robert Sharp wrote:
>> Does anyone know of a good, post GRSecurity guide to reasonable security
>> for the kernel? In the absence of anything else I will have to go back
>> to the KSPP list and
m myself?
Cheers,
R0b0t1
> What about the grsecurity-source overlay?
>
>
> On 29/03/18 11:47, Guillaume Ceccarelli wrote:
>
> Hi all,
>
> I’ve been a grsecurity customer for a little over two years now, and my use
> of it is as a small business, on Gentoo server instal
12 matches
Mail list logo