Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CA+55aFzQZvFohzd0SDFLoJWmGNw4NQFBzcUeEqtGmJpqo5aoXA@mail.gmail.com>
Date: Mon, 2 Jun 2014 14:02:34 -0700
From: Linus Torvalds <torvalds@...ux-foundation.org>
To: Thomas Gleixner <tglx@...utronix.de>
CC: Darren Hart <dvhart@...ux.intel.com>, Kees Cook <kees@...flux.net>,
 "security@...nel.org" <security@...nel.org>,
 linux-distros@...openwall.org, 	Sebastian Krahmer <krahmer@...e.de>,
 Ingo Molnar <mingo@...nel.org>
Subject: [vs-plain] Re: Re: exploitable futex vulnerability (CVE-2014-3153)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.