All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20121214233524.GA13659@mail.hallyn.com>

diff --git a/a/1.txt b/N1/1.txt
index 5231ccb..60774f9 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -1,6 +1,6 @@
-Quoting Eric W. Biederman (ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org):
+Quoting Eric W. Biederman (ebiederm@xmission.com):
 > 
-> Andy Lutomirski <luto-kltTT9wpgjJwATOyAt5JVQ@public.gmane.org> found a nasty little bug in
+> Andy Lutomirski <luto@amacapital.net> found a nasty little bug in
 > the permissions of setns.  With unprivileged user namespaces it
 > became possible to create new namespaces without privilege.
 > 
@@ -24,9 +24,9 @@ Quoting Eric W. Biederman (ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org):
 > Prevent this possibility by requiring CAP_SYS_ADMIN
 > in the current user namespace when joing all but the user namespace.
 > 
-> Signed-off-by: "Eric W. Biederman" <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>
+> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com>
 
-Acked-by: Serge Hallyn <serge.hallyn-Z7WLFzj8eWMS+FvcfC7Uqw@public.gmane.org>
+Acked-by: Serge Hallyn <serge.hallyn@canonical.com>
 
 > ---
 >  fs/namespace.c           |    3 ++-
diff --git a/a/content_digest b/N1/content_digest
index d668b51..1ae6584 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -1,20 +1,20 @@
  "ref\087txroxpgq.fsf@xmission.com\0"
  "ref\087hanoxpdh.fsf@xmission.com\0"
- "ref\087hanoxpdh.fsf-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org\0"
- "From\0Serge E. Hallyn <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org>\0"
+ "From\0Serge E. Hallyn <serge@hallyn.com>\0"
  "Subject\0Re: [PATCH 2/4] userns: Require CAP_SYS_ADMIN for most uses of setns.\0"
  "Date\0Fri, 14 Dec 2012 23:35:24 +0000\0"
- "To\0Eric W. Biederman <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>\0"
- "Cc\0Linux Containers <containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org>"
-  linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
-  Andy Lutomirski <luto-kltTT9wpgjJwATOyAt5JVQ@public.gmane.org>
-  David Howells <dhowells-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
- " linux-security-module-u79uwXL29TY76Z2rM5mHXA@public.gmane.org\0"
+ "To\0Eric W. Biederman <ebiederm@xmission.com>\0"
+ "Cc\0Linux Containers <containers@lists.linux-foundation.org>"
+  linux-security-module@vger.kernel.org
+  linux-kernel@vger.kernel.org
+  Serge E. Hallyn <serge@hallyn.com>
+  Andy Lutomirski <luto@amacapital.net>
+ " David Howells <dhowells@redhat.com>\0"
  "\00:1\0"
  "b\0"
- "Quoting Eric W. Biederman (ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org):\n"
+ "Quoting Eric W. Biederman (ebiederm@xmission.com):\n"
  "> \n"
- "> Andy Lutomirski <luto-kltTT9wpgjJwATOyAt5JVQ@public.gmane.org> found a nasty little bug in\n"
+ "> Andy Lutomirski <luto@amacapital.net> found a nasty little bug in\n"
  "> the permissions of setns.  With unprivileged user namespaces it\n"
  "> became possible to create new namespaces without privilege.\n"
  "> \n"
@@ -38,9 +38,9 @@
  "> Prevent this possibility by requiring CAP_SYS_ADMIN\n"
  "> in the current user namespace when joing all but the user namespace.\n"
  "> \n"
- "> Signed-off-by: \"Eric W. Biederman\" <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>\n"
+ "> Signed-off-by: \"Eric W. Biederman\" <ebiederm@xmission.com>\n"
  "\n"
- "Acked-by: Serge Hallyn <serge.hallyn-Z7WLFzj8eWMS+FvcfC7Uqw@public.gmane.org>\n"
+ "Acked-by: Serge Hallyn <serge.hallyn@canonical.com>\n"
  "\n"
  "> ---\n"
  ">  fs/namespace.c           |    3 ++-\n"
@@ -123,4 +123,4 @@
  "> -- \n"
  > 1.7.5.4
 
-810fb93737b0a9968d992987828dc1c79e0ae411d42f3e3e23b106f574628d71
+bdc8a2e790edcf879e16df48534a6d8769a2dfb9b482f16326986299d04a6934

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.