Your message dated Thu, 14 Oct 2004 16:57:28 +0900
with message-id <[EMAIL PROTECTED]>
and subject line Bug#276354: Linux capabilities per default not loaded
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 13 Oct 2004 15:09:11 +0000
>From [EMAIL PROTECTED] Wed Oct 13 08:09:11 2004
Return-path: <[EMAIL PROTECTED]>
Received: from mailrelay.tu-graz.ac.at (mailrelay02.tugraz.at) [129.27.3.7] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1CHkkY-0004da-00; Wed, 13 Oct 2004 08:09:11 -0700
Received: from fiicmgk01.tu-graz.ac.at (fiicmgk01.tu-graz.ac.at [129.27.200.50])
        by mailrelay02.tugraz.at (8.13.1/8.13.1) with ESMTP id i9DF8cFT005416
        for <[EMAIL PROTECTED]>; Wed, 13 Oct 2004 17:08:38 +0200 (CEST)
Received: from fiicmal01.tu-graz.ac.at (fiicmal01.tu-graz.ac.at [129.27.153.18])
        by fiicmgk01.tu-graz.ac.at (8.12.11/8.12.11) with ESMTP id 
i9DF8bEB023529
        for <[EMAIL PROTECTED]>; Wed, 13 Oct 2004 17:08:38 +0200
Received: from [] (fiicmpc78 [129.27.153.78])
        by fiicmal01.tu-graz.ac.at (8.12.8/8.12.8) with ESMTP id i9DF8bab029702
        for <[EMAIL PROTECTED]>; Wed, 13 Oct 2004 17:08:37 +0200
From: Christian Mayrhuber <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Linux capabilities per default not loaded
Date: Wed, 13 Oct 2004 17:16:16 +0200
User-Agent: KMail/1.7
MIME-Version: 1.0
Content-Type: text/plain;
  charset="us-ascii"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Message-Id: <[EMAIL PROTECTED]>
X-Scanned-By: MIMEDefang 2.45
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: kernel-image-2.6-686-smp
Version: 100

Please build the linux capabilities into the kernel or ask the user
to the capability module into /etc/modules during install.
The standard behaviour to have linux capabilites deactivated is
insecure.

-- 
lg, Chris

---------------------------------------
Received: (at 276354-done) by bugs.debian.org; 14 Oct 2004 08:33:18 +0000
>From [EMAIL PROTECTED] Thu Oct 14 01:33:18 2004
Return-path: <[EMAIL PROTECTED]>
Received: from koto.vergenet.net [210.128.90.7] 
        by spohr.debian.org with smtp (Exim 3.35 1 (Debian))
        id 1CI130-0005lC-00; Thu, 14 Oct 2004 01:33:18 -0700
Received: (qmail 12403 invoked by uid 7100); 14 Oct 2004 08:20:31 -0000
Date: Thu, 14 Oct 2004 16:57:28 +0900
From: Horms <[EMAIL PROTECTED]>
To: Christian Mayrhuber <[EMAIL PROTECTED]>,
  [EMAIL PROTECTED]
Subject: Re: Bug#276354: Linux capabilities per default not loaded
Message-ID: <[EMAIL PROTECTED]>
References: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[EMAIL PROTECTED]>
X-Cluestick: seven
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

On Wed, Oct 13, 2004 at 05:16:16PM +0200, Christian Mayrhuber wrote:
> Package: kernel-image-2.6-686-smp
> Version: 100
> 
> Please build the linux capabilities into the kernel or ask the user
> to the capability module into /etc/modules during install.
> The standard behaviour to have linux capabilites deactivated is
> insecure.

I do not believe it is the role of the debian-kernel team
to determine the security model that users use, rather, to
provide a kernel that allows users to make these decisions for
themselves.

-- 
Horms


Reply via email to