diff for duplicates of <1320694510.10093.23.camel@localhost> diff --git a/a/1.txt b/N1/1.txt index baa4f00..f1f2e54 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -1,5 +1,5 @@ On Fri, 2011-11-04 at 22:24 +0000, Serge Hallyn wrote: -> From: Serge E. Hallyn <serge.hallyn-Z7WLFzj8eWMS+FvcfC7Uqw@public.gmane.org> +> From: Serge E. Hallyn <serge.hallyn@canonical.com> > > cap_netlink_recv() was granting privilege if a capability is in > current_cap(), regardless of the user namespace. Fix that by diff --git a/a/content_digest b/N1/content_digest index 0066e41..5f9321a 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -1,21 +1,21 @@ "ref\01320445482-8459-1-git-send-email-serge@hallyn.com\0" "ref\01320445482-8459-7-git-send-email-serge@hallyn.com\0" - "ref\01320445482-8459-7-git-send-email-serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org\0" - "From\0Eric Paris <eparis-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>\0" + "From\0Eric Paris <eparis@redhat.com>\0" "Subject\0Re: [PATCH 6/6] protect cap_netlink_recv from user namespaces\0" "Date\0Mon, 07 Nov 2011 14:35:10 -0500\0" - "To\0Serge Hallyn <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org>\0" - "Cc\0richard-/L3Ra7n9ekc@public.gmane.org" - containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org - linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - oleg-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org - dhowells-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org - ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org - " akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b@public.gmane.org\0" + "To\0Serge Hallyn <serge@hallyn.com>\0" + "Cc\0linux-kernel@vger.kernel.org" + containers@lists.linux-foundation.org + oleg@redhat.com + richard@nod.at + akpm@linux-foundation.org + ebiederm@xmission.com + dhowells@redhat.com + " Serge E. Hallyn <serge.hallyn@canonical.com>\0" "\00:1\0" "b\0" "On Fri, 2011-11-04 at 22:24 +0000, Serge Hallyn wrote:\n" - "> From: Serge E. Hallyn <serge.hallyn-Z7WLFzj8eWMS+FvcfC7Uqw@public.gmane.org>\n" + "> From: Serge E. Hallyn <serge.hallyn@canonical.com>\n" "> \n" "> cap_netlink_recv() was granting privilege if a capability is in\n" "> current_cap(), regardless of the user namespace. Fix that by\n" @@ -45,4 +45,4 @@ "\n" -Eric -96dcd56815997f70128afcde3294b87c04792eb47b9f07e6f5c185dfc0e11e65 +e38e9f2c36da6dbe04dce45eb37886240ec7dafc5a1279d7c3ecf0b14bac2929
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.