diff for duplicates of <5486237D.4060304@nod.at> diff --git a/a/1.txt b/N1/1.txt index a32748c..6021f98 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -11,8 +11,8 @@ Am 08.12.2014 um 23:07 schrieb Eric W. Biederman: > This is part of the fix for CVE-2014-8989, being able to drop groups > without privilege using user namespaces. > -> Cc: stable-u79uwXL29TY76Z2rM5mHXA@public.gmane.org -> Signed-off-by: "Eric W. Biederman" <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org> +> Cc: stable@vger.kernel.org +> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> > --- > include/linux/user_namespace.h | 9 +++++++++ > kernel/groups.c | 7 ++++++- diff --git a/a/content_digest b/N1/content_digest index dbba5dc..500b550 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -12,25 +12,24 @@ "ref\0CALCETrXWx2-ZejEHmOi7aSoF-qJMRGR5yseeMhuurZwJRrQbUg@mail.gmail.com\0" "ref\087h9x5re41.fsf_-_@x220.int.ebiederm.org\0" "ref\087bnndre2h.fsf_-_@x220.int.ebiederm.org\0" - "ref\087bnndre2h.fsf_-_-JOvCrm2gF+uungPnsOpG7nhyD016LWXt@public.gmane.org\0" - "From\0Richard Weinberger <richard-/L3Ra7n9ekc@public.gmane.org>\0" + "From\0Richard Weinberger <richard@nod.at>\0" "Subject\0Re: [CFT][PATCH 2/7] userns: Don't allow setgroups until a gid mapping has been setablished\0" "Date\0Mon, 08 Dec 2014 23:17:33 +0100\0" - "To\0Eric W. Biederman <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>" - " Andy Lutomirski <luto-kltTT9wpgjJwATOyAt5JVQ@public.gmane.org>\0" - "Cc\0Linux Containers <containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org>" - Josh Triplett <josh-iaAMLnmF4UmaiuxdJuQwMA@public.gmane.org> - Andrew Morton <akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b@public.gmane.org> - Kees Cook <keescook-F7+t8E8rja9g9hUCZPvPmw@public.gmane.org> - Michael Kerrisk-manpages <mtk.manpages-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> - Linux API <linux-api-u79uwXL29TY76Z2rM5mHXA@public.gmane.org> - linux-man <linux-man-u79uwXL29TY76Z2rM5mHXA@public.gmane.org> - linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org <linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org> - LSM <linux-security-module-u79uwXL29TY76Z2rM5mHXA@public.gmane.org> - Casey Schaufler <casey-iSGtlc1asvQWG2LlvL+J4A@public.gmane.org> - Serge E. Hallyn <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org> - Kenton Varda <kenton-AuYgBwuPrUQTaNkGU808tA@public.gmane.org> - " stable <stable-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>\0" + "To\0Eric W. Biederman <ebiederm@xmission.com>" + " Andy Lutomirski <luto@amacapital.net>\0" + "Cc\0Linux Containers <containers@lists.linux-foundation.org>" + Josh Triplett <josh@joshtriplett.org> + Andrew Morton <akpm@linux-foundation.org> + Kees Cook <keescook@chromium.org> + Michael Kerrisk-manpages <mtk.manpages@gmail.com> + Linux API <linux-api@vger.kernel.org> + linux-man <linux-man@vger.kernel.org> + linux-kernel@vger.kernel.org <linux-kernel@vger.kernel.org> + LSM <linux-security-module@vger.kernel.org> + Casey Schaufler <casey@schaufler-ca.com> + Serge E. Hallyn <serge@hallyn.com> + Kenton Varda <kenton@sandstorm.io> + " stable <stable@vger.kernel.org>\0" "\00:1\0" "b\0" "Am 08.12.2014 um 23:07 schrieb Eric W. Biederman:\n" @@ -46,8 +45,8 @@ "> This is part of the fix for CVE-2014-8989, being able to drop groups\n" "> without privilege using user namespaces.\n" "> \n" - "> Cc: stable-u79uwXL29TY76Z2rM5mHXA@public.gmane.org\n" - "> Signed-off-by: \"Eric W. Biederman\" <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>\n" + "> Cc: stable@vger.kernel.org\n" + "> Signed-off-by: \"Eric W. Biederman\" <ebiederm@xmission.com>\n" "> ---\n" "> include/linux/user_namespace.h | 9 +++++++++\n" "> kernel/groups.c | 7 ++++++-\n" @@ -79,4 +78,4 @@ "Thanks,\n" //richard -ea723cb7287d81079f8bdbd13e40e95d3230794906d07b2b5213fcc707da190e +a912f9d2cc8dafbca018affa719186cc2e073c3d48e4cbdfcd72cad58e725ea0
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.