Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BN6PR11MB413239423FD0BC7B0990569CC6880@BN6PR11MB4132.namprd11.prod.outlook.com>
Date: Wed, 3 Jun 2020 19:01:50 +0000
From: "Williams, Dan J" <dan.j.williams@...el.com>
To: "Srivatsa S. Bhat" <srivatsa@...il.mit.edu>,
 Fan Yang	<Fan_Yang@...u.edu.cn>, Will Deacon <will@...nel.org>,
 "linux-distros@...openwall.org" <linux-distros@...openwall.org>
CC: Linus Torvalds <torvalds@...ux-foundation.org>, Oleg Nesterov
 <oleg@...hat.com>,
 "Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>,
 Marcus Meissner <meissner@...e.de>, Andrew Morton
 <akpm@...ux-foundation.org>, Security Officers <security@...nel.org>,
 "Mel Gorman" <mgorman@...e.de>
Subject: RE: [vs-plain] User can control PTE value to read/write anywhere,
 when "mremap" a hugepage mmaped DAX file to a mmaped anonymous memory
 region

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.