diff for duplicates of <20121228175627.GA7683@cachalot> diff --git a/a/1.txt b/N1/1.txt index ae9d872..07b9f50 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -39,7 +39,7 @@ is not counted as this user scheduler time. I suppose the issue is not veth-specific, almost all newly available for unprivileged users code pathes are vulnerable to DoS attacks. -Signed-off-by: Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org> +Signed-off-by: Vasily Kulikov <segoon@openwall.com> -- include/linux/sched.h | 3 +++ kernel/user_namespace.c | 26 ++++++++++++++++++++++++++ diff --git a/a/content_digest b/N1/content_digest index a86dff5..f1ff76d 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -1,11 +1,12 @@ - "From\0Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org>\0" - "Subject\0[PATCH/RFC] user_ns: fix missing limiting of user_ns counts\0" + "From\0Vasily Kulikov <segoon@openwall.com>\0" + "Subject\0[kernel-hardening] [PATCH/RFC] user_ns: fix missing limiting of user_ns counts\0" "Date\0Fri, 28 Dec 2012 21:56:27 +0400\0" - "To\0Containers <containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org>" - " Eric W. Biederman <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>\0" - "Cc\0Serge E. Hallyn <serge.hallyn-GeWIH/nMZzLQT0dZR+AlfA@public.gmane.org>" - linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - " kernel-hardening-ZwoEplunGu1jrUoiu81ncdBPR1lH4CV8@public.gmane.org\0" + "To\0Containers <containers@lists.linux-foundation.org>" + " Eric W. Biederman <ebiederm@xmission.com>\0" + "Cc\0Serge Hallyn <serge.hallyn@canonical.com>" + Serge E. Hallyn <serge.hallyn@ubuntu.com> + linux-kernel@vger.kernel.org + " kernel-hardening@lists.openwall.com\0" "\00:1\0" "b\0" "Currently there is completely no limiting in number of user namespaces\n" @@ -49,7 +50,7 @@ "veth-specific, almost all newly available for unprivileged users code\n" "pathes are vulnerable to DoS attacks.\n" "\n" - "Signed-off-by: Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org>\n" + "Signed-off-by: Vasily Kulikov <segoon@openwall.com>\n" "-- \n" " include/linux/sched.h | 3 +++\n" " kernel/user_namespace.c | 26 ++++++++++++++++++++++++++\n" @@ -136,4 +137,4 @@ "Vasily Kulikov\n" http://www.openwall.com - bringing security into open computing environments -e644c4de145790e4d419dd76479baea1718c09a59d558d8a2b5cc518411328ef +7c93c868636fdf07c19db7f92cde755a9d4eade4b9927f0d735bf4cbffc082a2
diff --git a/a/1.txt b/N2/1.txt index ae9d872..07b9f50 100644 --- a/a/1.txt +++ b/N2/1.txt @@ -39,7 +39,7 @@ is not counted as this user scheduler time. I suppose the issue is not veth-specific, almost all newly available for unprivileged users code pathes are vulnerable to DoS attacks. -Signed-off-by: Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org> +Signed-off-by: Vasily Kulikov <segoon@openwall.com> -- include/linux/sched.h | 3 +++ kernel/user_namespace.c | 26 ++++++++++++++++++++++++++ diff --git a/a/content_digest b/N2/content_digest index a86dff5..7dc1f80 100644 --- a/a/content_digest +++ b/N2/content_digest @@ -1,11 +1,12 @@ - "From\0Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org>\0" + "From\0Vasily Kulikov <segoon@openwall.com>\0" "Subject\0[PATCH/RFC] user_ns: fix missing limiting of user_ns counts\0" "Date\0Fri, 28 Dec 2012 21:56:27 +0400\0" - "To\0Containers <containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org>" - " Eric W. Biederman <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>\0" - "Cc\0Serge E. Hallyn <serge.hallyn-GeWIH/nMZzLQT0dZR+AlfA@public.gmane.org>" - linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org - " kernel-hardening-ZwoEplunGu1jrUoiu81ncdBPR1lH4CV8@public.gmane.org\0" + "To\0Containers <containers@lists.linux-foundation.org>" + " Eric W. Biederman <ebiederm@xmission.com>\0" + "Cc\0Serge Hallyn <serge.hallyn@canonical.com>" + Serge E. Hallyn <serge.hallyn@ubuntu.com> + linux-kernel@vger.kernel.org + " kernel-hardening@lists.openwall.com\0" "\00:1\0" "b\0" "Currently there is completely no limiting in number of user namespaces\n" @@ -49,7 +50,7 @@ "veth-specific, almost all newly available for unprivileged users code\n" "pathes are vulnerable to DoS attacks.\n" "\n" - "Signed-off-by: Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org>\n" + "Signed-off-by: Vasily Kulikov <segoon@openwall.com>\n" "-- \n" " include/linux/sched.h | 3 +++\n" " kernel/user_namespace.c | 26 ++++++++++++++++++++++++++\n" @@ -136,4 +137,4 @@ "Vasily Kulikov\n" http://www.openwall.com - bringing security into open computing environments -e644c4de145790e4d419dd76479baea1718c09a59d558d8a2b5cc518411328ef +5d710c495fa2e3a8661b5e5d24c08ce27a5e188c721e3df70bb91e72edd399c0
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.