|
Message-ID: <CAF=yD-Kp-h66zGTsifP_GuhTiZ=9uFHhQGQ6-Jm5roc+CsEvsw@mail.gmail.com> Date: Mon, 7 Aug 2017 07:53:24 -0700 From: Willem de Bruijn <willemdebruijn.kernel@...il.com> To: Marcus Meissner <meissner@...e.de> CC: Andrey Konovalov <andreyknvl@...il.com>, kseifried@...hat.com, linux-distros@...openwall.org, Dmitry Vyukov <dvyukov@...gle.com>, Kostya Serebryany <kcc@...gle.com>, Eric Dumazet <edumazet@...gle.com>, David Miller <davem@...emloft.net>, Ben Hawkes <hawkes@...gle.com> Subject: Re: ***UNCHECKED*** Re: [vs-plain] Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.