From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S263130AbUAEQcE (ORCPT ); Mon, 5 Jan 2004 11:32:04 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S263173AbUAEQcE (ORCPT ); Mon, 5 Jan 2004 11:32:04 -0500 Received: from kiuru.kpnet.fi ([193.184.122.21]:44211 "EHLO kiuru.kpnet.fi") by vger.kernel.org with ESMTP id S263130AbUAEQcB (ORCPT ); Mon, 5 Jan 2004 11:32:01 -0500 Subject: 2.6.1-rc1 affected? From: Markus =?ISO-8859-1?Q?H=E4stbacka?= To: Kernel Mailinglist Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="=-bHabYS89g2/UxrTJkOhs" Message-Id: <1073320318.21198.2.camel@midux> Mime-Version: 1.0 X-Mailer: Ximian Evolution 1.4.5 Date: Mon, 05 Jan 2004 18:31:58 +0200 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org --=-bHabYS89g2/UxrTJkOhs Content-Type: text/plain; charset=ISO-8859-15 Content-Transfer-Encoding: quoted-printable Hello list, I heard the news about the new exploit, and I'm wondering if 2.6.0 or 2.6.1-rc1 is affected with this mremap bug? Thanks, Best regards, Markus --=20 "Software is like sex, it's better when it's free." Markus H=E4stbacka --=-bHabYS89g2/UxrTJkOhs Content-Type: application/pgp-signature; name=signature.asc Content-Description: This is a digitally signed message part -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQA/+ZF93+NhIWS1JHARAsGpAJ0biXqk6ANBeV4YXy9VBIrh+pIIaACgjp1r g3LQ/oB83PeXclWj8qPCDfU= =S9tx -----END PGP SIGNATURE----- --=-bHabYS89g2/UxrTJkOhs--