Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S263462AbTKFKGK (ORCPT ); Thu, 6 Nov 2003 05:06:10 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S263488AbTKFKGK (ORCPT ); Thu, 6 Nov 2003 05:06:10 -0500 Received: from outpost.ds9a.nl ([213.244.168.210]:15532 "EHLO outpost.ds9a.nl") by vger.kernel.org with ESMTP id S263462AbTKFKGI (ORCPT ); Thu, 6 Nov 2003 05:06:08 -0500 Date: Thu, 6 Nov 2003 11:06:07 +0100 From: bert hubert To: Scott Robert Ladd Cc: Larry McVoy , linux-kernel@vger.kernel.org Subject: Re: BK2CVS problem Message-ID: <20031106100606.GA23891@outpost.ds9a.nl> Mail-Followup-To: bert hubert , Scott Robert Ladd , Larry McVoy , linux-kernel@vger.kernel.org References: <18DFD6B776308241A200853F3F83D507169CBC@pl6w2kex.lan.powerlandcomputers.com> <20031105230350.GB12992@work.bitmover.com> <3FA9C974.3010002@coyotegulch.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <3FA9C974.3010002@coyotegulch.com> User-Agent: Mutt/1.3.28i Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 668 Lines: 16 On Wed, Nov 05, 2003 at 11:09:24PM -0500, Scott Robert Ladd wrote: > In other words, the theoretical exploit was inserted by someone clever. > Do we have any idea who? And, was there any route via which this malicious patch could've worked itself into a kernel release? -- http://www.PowerDNS.com Open source, database driven DNS Software http://lartc.org Linux Advanced Routing & Traffic Control HOWTO - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/