Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAGXu5j+RwE0nz+AT7QNi3OjdXbGmaPycO1+m86c1zk4QHMVsYQ@mail.gmail.com>
Date: Fri, 4 Aug 2017 11:40:26 -0700
From: Kees Cook <keescook@...omium.org>
To: linux-distros@...openwall.org
CC: Linus Torvalds <torvalds@...ux-foundation.org>, Andrey Konovalov
 <andreyknvl@...il.com>, 	Greg KH <greg@...ah.com>,
 "security@...nel.org" <security@...nel.org>,
 willemdebruijn.kernel@...il.com, 	Dmitry Vyukov <dvyukov@...gle.com>,
 Kostya Serebryany <kcc@...gle.com>, Eric Dumazet <edumazet@...gle.com>,
 David Miller <davem@...emloft.net>
Subject: [vs-plain] Re: Exploitable memory corruption due to UFO to
 non-UFO path switch

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.