All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <1320694510.10093.23.camel@localhost>

diff --git a/a/1.txt b/N1/1.txt
index baa4f00..f1f2e54 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,5 +1,5 @@
 On Fri, 2011-11-04 at 22:24 +0000, Serge Hallyn wrote:
-> From: Serge E. Hallyn <serge.hallyn-Z7WLFzj8eWMS+FvcfC7Uqw@public.gmane.org>
+> From: Serge E. Hallyn <serge.hallyn@canonical.com>
 > 
 > cap_netlink_recv() was granting privilege if a capability is in
 > current_cap(), regardless of the user namespace.  Fix that by
diff --git a/a/content_digest b/N1/content_digest
index 0066e41..5f9321a 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -1,21 +1,21 @@
  "ref\01320445482-8459-1-git-send-email-serge@hallyn.com\0"
  "ref\01320445482-8459-7-git-send-email-serge@hallyn.com\0"
- "ref\01320445482-8459-7-git-send-email-serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org\0"
- "From\0Eric Paris <eparis-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>\0"
+ "From\0Eric Paris <eparis@redhat.com>\0"
  "Subject\0Re: [PATCH 6/6] protect cap_netlink_recv from user namespaces\0"
  "Date\0Mon, 07 Nov 2011 14:35:10 -0500\0"
- "To\0Serge Hallyn <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org>\0"
- "Cc\0richard-/L3Ra7n9ekc@public.gmane.org"
-  containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org
-  linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  oleg-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org
-  dhowells-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org
-  ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org
- " akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b@public.gmane.org\0"
+ "To\0Serge Hallyn <serge@hallyn.com>\0"
+ "Cc\0linux-kernel@vger.kernel.org"
+  containers@lists.linux-foundation.org
+  oleg@redhat.com
+  richard@nod.at
+  akpm@linux-foundation.org
+  ebiederm@xmission.com
+  dhowells@redhat.com
+ " Serge E. Hallyn <serge.hallyn@canonical.com>\0"
  "\00:1\0"
  "b\0"
  "On Fri, 2011-11-04 at 22:24 +0000, Serge Hallyn wrote:\n"
- "> From: Serge E. Hallyn <serge.hallyn-Z7WLFzj8eWMS+FvcfC7Uqw@public.gmane.org>\n"
+ "> From: Serge E. Hallyn <serge.hallyn@canonical.com>\n"
  "> \n"
  "> cap_netlink_recv() was granting privilege if a capability is in\n"
  "> current_cap(), regardless of the user namespace.  Fix that by\n"
@@ -45,4 +45,4 @@
  "\n"
  -Eric
 
-96dcd56815997f70128afcde3294b87c04792eb47b9f07e6f5c185dfc0e11e65
+e38e9f2c36da6dbe04dce45eb37886240ec7dafc5a1279d7c3ecf0b14bac2929

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.