Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <56CD45EE.1000901@oracle.com>
Date: Tue, 23 Feb 2016 21:55:58 -0800
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: Re: Access to /dev/pts devices via pt_chown and user
 namespaces

On 02/23/16 09:27 PM, halfdog wrote:
> That is nice, that this was done already for OWL. Is there a checklist
> or perhaps even a tool, that can be run, to detect, which weak
> programs, compile time settings or runtime settings might be applied
> to a given Linux setup?

Something like OpenSCAP perhaps?

https://www.open-scap.org/

-- 
	-Alan Coopersmith-              alan.coopersmith@...cle.com
	 Oracle Solaris Engineering - http://blogs.oracle.com/alanc

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.