|
Message-ID: <CAGXu5j+RwE0nz+AT7QNi3OjdXbGmaPycO1+m86c1zk4QHMVsYQ@mail.gmail.com> Date: Fri, 4 Aug 2017 11:40:26 -0700 From: Kees Cook <keescook@...omium.org> To: linux-distros@...openwall.org CC: Linus Torvalds <torvalds@...ux-foundation.org>, Andrey Konovalov <andreyknvl@...il.com>, Greg KH <greg@...ah.com>, "security@...nel.org" <security@...nel.org>, willemdebruijn.kernel@...il.com, Dmitry Vyukov <dvyukov@...gle.com>, Kostya Serebryany <kcc@...gle.com>, Eric Dumazet <edumazet@...gle.com>, David Miller <davem@...emloft.net> Subject: [vs-plain] Re: Exploitable memory corruption due to UFO to non-UFO path switch
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.