lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 2 Jan 2012 17:08:31 -0800 From: Greg KH <gregkh@...e.de> To: Konstantin Khlebnikov <khlebnikov@...nvz.org> Cc: "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org> Subject: Re: [PATCH] tty: cleanup prohibition of direct opening for unix98 pty master On Tue, Jan 03, 2012 at 02:29:08AM +0400, Konstantin Khlebnikov wrote: > Greg KH wrote: > >On Mon, Jan 02, 2012 at 09:22:31PM +0400, Konstantin Khlebnikov wrote: > >>cleanup hack added in v2.6.27-3203-g15582d3 > >> > >>comment from that patch: > >> > >>: pty: If the administrator creates a device for a ptmx slave we should not error > >>: > >>: The open path for ptmx slaves is via the ptmx device. Opening them any > >>: other way is not allowed. Vegard Nossum found that previously this was not > >>: the case and mknod foo c 128 42; cat foo would produce nasty diagnostics > >>: > >>: Signed-off-by: Alan Cox<alan@...hat.com> > >>: Signed-off-by: Linus Torvalds<torvalds@...ux-foundation.org> > > > >Any reason why you didn't include these two people on this patch? > >Perhaps they might wish to review it... > > This is just simple cleanup patch. Even so, please resend and copy them. greg k-h -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists