Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S263524AbTKFMCH (ORCPT ); Thu, 6 Nov 2003 07:02:07 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S263525AbTKFMCH (ORCPT ); Thu, 6 Nov 2003 07:02:07 -0500 Received: from dsl-217-155-81-174.zen.co.uk ([217.155.81.174]:14222 "EHLO moon.xades.com") by vger.kernel.org with ESMTP id S263524AbTKFMCF (ORCPT ); Thu, 6 Nov 2003 07:02:05 -0500 Subject: Re: BK2CVS problem From: nosp To: Andrew Walrond Cc: linux-kernel@vger.kernel.org In-Reply-To: <200311061141.00595.andrew@walrond.org> References: <20031105204522.GA11431@work.bitmover.com> <20031105225134.GA14149@win.tue.nl> <20031106070721.GA18028@mcgroarty.net> <200311061141.00595.andrew@walrond.org> Content-Type: text/plain Message-Id: <1068120121.593.161.camel@earth.xades.com> Mime-Version: 1.0 X-Mailer: Ximian Evolution 1.4.5 (1.4.5-7) Date: Thu, 06 Nov 2003 12:02:01 +0000 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 637 Lines: 13 On Thu, 2003-11-06 at 11:41, Andrew Walrond wrote: > Somebody getting access to and inserting exploits directly into the linux > source is not something we should take lightly. Whilst we understand the > limits of the problem, the fact that it happened at all could get /.'d out of > all proportion and be used to seriously undermine linux's reputation Already happened. Check slashdot. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/