> For 2.6.38, and Andi's 2.6.35 which has the potential for an
> unprivileged process to trigger an oops, it seems irresponsible to me to
> not include this change.  People who exploit kernel flaws seem good at
> taking random Oops's and converting them into methods for privilege
> escalation.

I'll ship 2.6.25.14 without the patch, but can you guys please come to a 
conclusion whether the patch is useful or not. I'll reconsider it for .15.

Thanks,

-Andi

_______________________________________________
stable mailing list
stable@linux.kernel.org
http://linux.kernel.org/mailman/listinfo/stable

Reply via email to