All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20121228175627.GA7683@cachalot>

diff --git a/a/1.txt b/N1/1.txt
index ae9d872..07b9f50 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -39,7 +39,7 @@ is not counted as this user scheduler time.   I suppose the issue is not
 veth-specific, almost all newly available for unprivileged users code
 pathes are vulnerable to DoS attacks.
 
-Signed-off-by: Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org>
+Signed-off-by: Vasily Kulikov <segoon@openwall.com>
 -- 
  include/linux/sched.h   |    3 +++
  kernel/user_namespace.c |   26 ++++++++++++++++++++++++++
diff --git a/a/content_digest b/N1/content_digest
index a86dff5..f1ff76d 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -1,11 +1,12 @@
- "From\0Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org>\0"
- "Subject\0[PATCH/RFC] user_ns: fix missing limiting of user_ns counts\0"
+ "From\0Vasily Kulikov <segoon@openwall.com>\0"
+ "Subject\0[kernel-hardening] [PATCH/RFC] user_ns: fix missing limiting of user_ns counts\0"
  "Date\0Fri, 28 Dec 2012 21:56:27 +0400\0"
- "To\0Containers <containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org>"
- " Eric W. Biederman <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>\0"
- "Cc\0Serge E. Hallyn <serge.hallyn-GeWIH/nMZzLQT0dZR+AlfA@public.gmane.org>"
-  linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
- " kernel-hardening-ZwoEplunGu1jrUoiu81ncdBPR1lH4CV8@public.gmane.org\0"
+ "To\0Containers <containers@lists.linux-foundation.org>"
+ " Eric W. Biederman <ebiederm@xmission.com>\0"
+ "Cc\0Serge Hallyn <serge.hallyn@canonical.com>"
+  Serge E. Hallyn <serge.hallyn@ubuntu.com>
+  linux-kernel@vger.kernel.org
+ " kernel-hardening@lists.openwall.com\0"
  "\00:1\0"
  "b\0"
  "Currently there is completely no limiting in number of user namespaces\n"
@@ -49,7 +50,7 @@
  "veth-specific, almost all newly available for unprivileged users code\n"
  "pathes are vulnerable to DoS attacks.\n"
  "\n"
- "Signed-off-by: Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org>\n"
+ "Signed-off-by: Vasily Kulikov <segoon@openwall.com>\n"
  "-- \n"
  " include/linux/sched.h   |    3 +++\n"
  " kernel/user_namespace.c |   26 ++++++++++++++++++++++++++\n"
@@ -136,4 +137,4 @@
  "Vasily Kulikov\n"
  http://www.openwall.com - bringing security into open computing environments
 
-e644c4de145790e4d419dd76479baea1718c09a59d558d8a2b5cc518411328ef
+7c93c868636fdf07c19db7f92cde755a9d4eade4b9927f0d735bf4cbffc082a2

diff --git a/a/1.txt b/N2/1.txt
index ae9d872..07b9f50 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -39,7 +39,7 @@ is not counted as this user scheduler time.   I suppose the issue is not
 veth-specific, almost all newly available for unprivileged users code
 pathes are vulnerable to DoS attacks.
 
-Signed-off-by: Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org>
+Signed-off-by: Vasily Kulikov <segoon@openwall.com>
 -- 
  include/linux/sched.h   |    3 +++
  kernel/user_namespace.c |   26 ++++++++++++++++++++++++++
diff --git a/a/content_digest b/N2/content_digest
index a86dff5..7dc1f80 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -1,11 +1,12 @@
- "From\0Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org>\0"
+ "From\0Vasily Kulikov <segoon@openwall.com>\0"
  "Subject\0[PATCH/RFC] user_ns: fix missing limiting of user_ns counts\0"
  "Date\0Fri, 28 Dec 2012 21:56:27 +0400\0"
- "To\0Containers <containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org>"
- " Eric W. Biederman <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>\0"
- "Cc\0Serge E. Hallyn <serge.hallyn-GeWIH/nMZzLQT0dZR+AlfA@public.gmane.org>"
-  linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
- " kernel-hardening-ZwoEplunGu1jrUoiu81ncdBPR1lH4CV8@public.gmane.org\0"
+ "To\0Containers <containers@lists.linux-foundation.org>"
+ " Eric W. Biederman <ebiederm@xmission.com>\0"
+ "Cc\0Serge Hallyn <serge.hallyn@canonical.com>"
+  Serge E. Hallyn <serge.hallyn@ubuntu.com>
+  linux-kernel@vger.kernel.org
+ " kernel-hardening@lists.openwall.com\0"
  "\00:1\0"
  "b\0"
  "Currently there is completely no limiting in number of user namespaces\n"
@@ -49,7 +50,7 @@
  "veth-specific, almost all newly available for unprivileged users code\n"
  "pathes are vulnerable to DoS attacks.\n"
  "\n"
- "Signed-off-by: Vasily Kulikov <segoon-cxoSlKxDwOJWk0Htik3J/w@public.gmane.org>\n"
+ "Signed-off-by: Vasily Kulikov <segoon@openwall.com>\n"
  "-- \n"
  " include/linux/sched.h   |    3 +++\n"
  " kernel/user_namespace.c |   26 ++++++++++++++++++++++++++\n"
@@ -136,4 +137,4 @@
  "Vasily Kulikov\n"
  http://www.openwall.com - bringing security into open computing environments
 
-e644c4de145790e4d419dd76479baea1718c09a59d558d8a2b5cc518411328ef
+5d710c495fa2e3a8661b5e5d24c08ce27a5e188c721e3df70bb91e72edd399c0

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.