Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S261308AbVABUBX (ORCPT ); Sun, 2 Jan 2005 15:01:23 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S261311AbVABUBX (ORCPT ); Sun, 2 Jan 2005 15:01:23 -0500 Received: from verein.lst.de ([213.95.11.210]:3717 "EHLO mail.lst.de") by vger.kernel.org with ESMTP id S261308AbVABUBV (ORCPT ); Sun, 2 Jan 2005 15:01:21 -0500 Date: Sun, 2 Jan 2005 21:01:16 +0100 From: Christoph Hellwig To: torvalds@osdl.org Cc: linux-kernel@vger.kernel.org Subject: Re: [PATCH] disallow modular capabilities Message-ID: <20050102200116.GA8660@lst.de> References: <20050102200032.GA8623@lst.de> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20050102200032.GA8623@lst.de> User-Agent: Mutt/1.3.28i X-Spam-Score: -4.901 () BAYES_00 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 532 Lines: 12 On Sun, Jan 02, 2005 at 09:00:32PM +0100, Christoph Hellwig wrote: > There's been a bugtraq report about a root exploit with modular > capabilities LSM support out for more than a week. Umm, forgot the url: http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2004-12/0390.html - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/