Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Wed, 19 Mar 2003 15:56:38 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Wed, 19 Mar 2003 15:56:38 -0500 Received: from avscan1.sentex.ca ([199.212.134.11]:4108 "EHLO avscan1.sentex.ca") by vger.kernel.org with ESMTP id ; Wed, 19 Mar 2003 15:56:37 -0500 Message-ID: <01f001c2ee5b$f418dd20$294b82ce@connecttech.com> From: "Stuart MacDonald" To: "Andrus Nomm" , References: <000701c2ee22$efe61fd0$0100a8c0@andrus> Subject: Re: Kernels 2.2 and 2.4 exploit (ALL VERSION WHAT I HAVE TESTED UNTILL NOW!) - removed link Date: Wed, 19 Mar 2003 16:10:22 -0500 Organization: Connect Tech Inc. X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.50.4920.2300 X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4920.2300 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 574 Lines: 18 From: "Andrus Nomm" > It is an linux kernel development team fault that they do not give any > direct instructions how to submit bug, now this eploit is very public > probably. linux/REPORTING_BUGS The irony is that the bug reporting process makes the bug public, so you would've had the same result. ..Stu - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/