> For 2.6.38, and Andi's 2.6.35 which has the potential for an > unprivileged process to trigger an oops, it seems irresponsible to me to > not include this change. People who exploit kernel flaws seem good at > taking random Oops's and converting them into methods for privilege > escalation.
I'll ship 2.6.25.14 without the patch, but can you guys please come to a conclusion whether the patch is useful or not. I'll reconsider it for .15. Thanks, -Andi _______________________________________________ stable mailing list stable@linux.kernel.org http://linux.kernel.org/mailman/listinfo/stable