seccompsandbox


ID Status Summary
21 New Non-blocking IO Type-Defect Priority-Medium
20 Fixed Disable PaX mprotect Type-Defect Priority-Medium
19 Fixed Missing unistd.h include in test_patching.cc Type-Defect Priority-Medium
18 Fixed ssize_t not found in library.h Type-Defect Priority-Medium
17 Fixed The sandbox does not intercept glibc's calls to the x86-64 vsyscall page Type-Defect Priority-Medium
16 Fixed Build error with GCC 4.6 on x64 Type-Defect Priority-Medium
15 Fixed The return value of NOINTR_SYS is ignored Type-Defect Priority-Medium
14 Fixed clang error: cmp literal, memaddress is ambiguous Type-Defect Priority-Medium
13 Accepted Extend the sandbox to work for legacy programs Type-Enhancement Priority-Medium
12 Fixed Change syscallTable to be filled out at run time Type-Enhancement Priority-Medium
11 Accepted Split code into "trusted" and "untrusted" directories Type-Enhancement Priority-Medium
10 Accepted Allow sandbox to be initialised without needing access to /proc Type-Enhancement Priority-Medium
9 Accepted Allow libraries to be patched before fork(), before enabling sandbox Type-Enhancement Priority-Medium
8 Accepted kMaxThreads=100 is rather low for Native Client Type-Enhancement Priority-Medium NaCl
7 Accepted seccomp-sandbox dirties 4k*kMaxThreads on startup (currently 400k) Type-Enhancement Priority-Medium
6 Fixed Vulnerability in process_sigaction() Type-Defect Priority-Medium
5 Accepted Test failures on 32-bit systems due to differences in NX page protection Type-Defect Priority-Medium
4 Fixed test_debugging fails on x86-64 because %gs is 0 Type-Defect Priority-Medium
3 Fixed Restrictions on sendmsg() could be bypassed through race using MAP_SHARED Type-Defect Priority-Medium
2 Accepted Concurrent sendmsg()/recvmsg() calls are not allowed Type-Enhancement Priority-Medium
1 Fixed Build error with GCC 4.5 Type-Defect Priority-Medium