Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CA+fCnZdwSoNE-ay1bk0aEhn+_j51SK5vfoxLkejERB9p8=TJ-A@mail.gmail.com>
Date: Thu, 10 Aug 2017 23:00:54 +0200
From: Andrey Konovalov <andreyknvl@...il.com>
To: kseifried@...hat.com
CC: linux-distros@...openwall.org, willemdebruijn.kernel@...il.com,
 Dmitry Vyukov <dvyukov@...gle.com>, Kostya Serebryany <kcc@...gle.com>,
 Eric Dumazet <edumazet@...gle.com>, 	David Miller <davem@...emloft.net>,
 Ben Hawkes <hawkes@...gle.com>
Subject: Re: [vs-plain] Linux kernel: Exploitable memory corruption due to
 UFO to non-UFO path switch

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.