Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CA+fCnZc-o_JM2iK7M1gW-gyJUa4v_6RU+YFTC6BBkb1E1p5R=g@mail.gmail.com>
Date: Fri, 4 Aug 2017 17:59:10 +0200
From: Andrey Konovalov <andreyknvl@...il.com>
To: linux-distros@...openwall.org
CC: willemdebruijn.kernel@...il.com, Dmitry Vyukov <dvyukov@...gle.com>,
 Kostya Serebryany <kcc@...gle.com>, edumazet@...gle.com, David Miller
 <davem@...emloft.net>, 	Ben Hawkes <hawkes@...gle.com>
Subject: [vs-plain] Linux kernel: Exploitable memory corruption due to UFO
 to non-UFO path switch

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.