Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAF=yD-Kp-h66zGTsifP_GuhTiZ=9uFHhQGQ6-Jm5roc+CsEvsw@mail.gmail.com>
Date: Mon, 7 Aug 2017 07:53:24 -0700
From: Willem de Bruijn <willemdebruijn.kernel@...il.com>
To: Marcus Meissner <meissner@...e.de>
CC: Andrey Konovalov <andreyknvl@...il.com>, kseifried@...hat.com,
 linux-distros@...openwall.org, Dmitry Vyukov <dvyukov@...gle.com>,
 Kostya Serebryany <kcc@...gle.com>, Eric Dumazet <edumazet@...gle.com>,
 David Miller <davem@...emloft.net>, 	Ben Hawkes <hawkes@...gle.com>
Subject: Re: ***UNCHECKED*** Re: [vs-plain] Linux kernel: Exploitable
 memory corruption due to UFO to non-UFO path switch

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.