logoalt Hacker News

fulafeltoday at 4:57 AM1 replyview on HN

Both of these (copy fail and dirtyfrag) exploit obscure socket address families. Are these filtered by commonly used seccomp profiles in eg docker (assuming seccomp can express it)?


Replies

YZFtoday at 5:09 AM

At least in the k8s setup I looked at the dirtyfrag were filtered (by default).

"XFRM SA registration requires CAP_NET_ADMIN".