diff for duplicates of <20121214233524.GA13659@mail.hallyn.com> diff --git a/a/1.txt b/N1/1.txt index 5231ccb..60774f9 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -1,6 +1,6 @@ -Quoting Eric W. Biederman (ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org): +Quoting Eric W. Biederman (ebiederm@xmission.com): > -> Andy Lutomirski <luto-kltTT9wpgjJwATOyAt5JVQ@public.gmane.org> found a nasty little bug in +> Andy Lutomirski <luto@amacapital.net> found a nasty little bug in > the permissions of setns. With unprivileged user namespaces it > became possible to create new namespaces without privilege. > @@ -24,9 +24,9 @@ Quoting Eric W. Biederman (ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org): > Prevent this possibility by requiring CAP_SYS_ADMIN > in the current user namespace when joing all but the user namespace. > -> Signed-off-by: "Eric W. Biederman" <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org> +> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> -Acked-by: Serge Hallyn <serge.hallyn-Z7WLFzj8eWMS+FvcfC7Uqw@public.gmane.org> +Acked-by: Serge Hallyn <serge.hallyn@canonical.com> > --- > fs/namespace.c | 3 ++- diff --git a/a/content_digest b/N1/content_digest index d668b51..1ae6584 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -1,20 +1,20 @@ "ref\087txroxpgq.fsf@xmission.com\0" "ref\087hanoxpdh.fsf@xmission.com\0" - "ref\087hanoxpdh.fsf-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org\0" - "From\0Serge E. Hallyn <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org>\0" + "From\0Serge E. Hallyn <serge@hallyn.com>\0" "Subject\0Re: [PATCH 2/4] userns: Require CAP_SYS_ADMIN for most uses of setns.\0" "Date\0Fri, 14 Dec 2012 23:35:24 +0000\0" - "To\0Eric W. Biederman <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>\0" - "Cc\0Linux Containers <containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org>" - linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - Andy Lutomirski <luto-kltTT9wpgjJwATOyAt5JVQ@public.gmane.org> - David Howells <dhowells-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org> - " linux-security-module-u79uwXL29TY76Z2rM5mHXA@public.gmane.org\0" + "To\0Eric W. Biederman <ebiederm@xmission.com>\0" + "Cc\0Linux Containers <containers@lists.linux-foundation.org>" + linux-security-module@vger.kernel.org + linux-kernel@vger.kernel.org + Serge E. Hallyn <serge@hallyn.com> + Andy Lutomirski <luto@amacapital.net> + " David Howells <dhowells@redhat.com>\0" "\00:1\0" "b\0" - "Quoting Eric W. Biederman (ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org):\n" + "Quoting Eric W. Biederman (ebiederm@xmission.com):\n" "> \n" - "> Andy Lutomirski <luto-kltTT9wpgjJwATOyAt5JVQ@public.gmane.org> found a nasty little bug in\n" + "> Andy Lutomirski <luto@amacapital.net> found a nasty little bug in\n" "> the permissions of setns. With unprivileged user namespaces it\n" "> became possible to create new namespaces without privilege.\n" "> \n" @@ -38,9 +38,9 @@ "> Prevent this possibility by requiring CAP_SYS_ADMIN\n" "> in the current user namespace when joing all but the user namespace.\n" "> \n" - "> Signed-off-by: \"Eric W. Biederman\" <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>\n" + "> Signed-off-by: \"Eric W. Biederman\" <ebiederm@xmission.com>\n" "\n" - "Acked-by: Serge Hallyn <serge.hallyn-Z7WLFzj8eWMS+FvcfC7Uqw@public.gmane.org>\n" + "Acked-by: Serge Hallyn <serge.hallyn@canonical.com>\n" "\n" "> ---\n" "> fs/namespace.c | 3 ++-\n" @@ -123,4 +123,4 @@ "> -- \n" > 1.7.5.4 -810fb93737b0a9968d992987828dc1c79e0ae411d42f3e3e23b106f574628d71 +bdc8a2e790edcf879e16df48534a6d8769a2dfb9b482f16326986299d04a6934
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.