* frm offerat_private "09/07/01 10:50:24 -0700" | sed '1,$s/^/* /' * ** ** So, now perhaps you/SGI could respond to Greg's complaints about the ** patch ** (http://mail.wirex.com/pipermail/linux-security-module/2001-September/001 ** 871.html), specifically the repositioning of some of the capable calls ** and the reordering of the ptrace logic. I provided my $0.02 on those ** issues ** (http://mail.wirex.com/pipermail/linux-security-module/2001-September/001 ** 872.html), but I don't think you or SGI have said anything. * * We can do this, we'll try to get a ptrace only patch for discussion asap, * hopefully Monday. * I've gone back through your patch, and can't see anything wrong with the placement of the hooks or the capable calls. In particular the searches I did for ptrace vulnerabilities only seemed to affect 2.2, so I'm not sure what Greg's comment was aluding too. Greg, obviously you're more up on kernel development than I am, can you give me a hint. Or was it just a general warning "there have been issues with this code in the past, be very careful about changing any logic". Thanks, richard. ----------------------------------------------------------------------- Richard Offer Technical Lead, Trust Technology, SGI "Specialization is for insects" _______________________________________________________________________ _______________________________________________ linux-security-module mailing list linux-security-moduleat_private http://mail.wirex.com/mailman/listinfo/linux-security-module
This archive was generated by hypermail 2b30 : Mon Sep 10 2001 - 17:33:38 PDT