[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [VULN 0/4] Hurd vulnerability details
From: |
Ludovic Courtès |
Subject: |
Re: [VULN 0/4] Hurd vulnerability details |
Date: |
Tue, 09 Nov 2021 18:19:03 +0100 |
User-agent: |
Gnus/5.13 (Gnus v5.13) Emacs/27.2 (gnu/linux) |
Hello,
Samuel Thibault <samuel.thibault@gnu.org> skribis:
> Thanks a lot for this writing! That'll surely be an interesting read for
> whoever wants to look a bit at the details of how the Hurd works. And of
> course thanks for finding and fixing the vulnerabilities :)
Seconded. It’s interesting both from a security perspective and as a
deep dive into Mach/Hurd internals; excellent work, Sergey!
Am I right that the fixes have not been applied yet in the upstream
repository?
Thanks,
Ludo’.
- [VULN 0/4] Hurd vulnerability details, Sergey Bugaev, 2021/11/02
- [VULN 2/4] No read-only mappings, Sergey Bugaev, 2021/11/02
- [VULN 1/4] Fake notifications, Sergey Bugaev, 2021/11/02
- [VULN 3/4] setuid exec race, Sergey Bugaev, 2021/11/02
- [VULN 4/4] Process auth man-in-the-middle, Sergey Bugaev, 2021/11/02
- Re: [VULN 0/4] Hurd vulnerability details, Samuel Thibault, 2021/11/02
- Re: [VULN 0/4] Hurd vulnerability details, Guy-Fleury Iteriteka, 2021/11/02