Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <EAFAD64E-7B97-4BDE-A240-1054C7A45677@sjtu.edu.cn>
Date: Thu, 4 Jun 2020 16:59:49 +0800
From: Fan Yang <Fan_Yang@...u.edu.cn>
To: Greg KH <greg@...ah.com>, Marcus Meissner <meissner@...e.de>
CC: Solar Designer <solar@...nwall.com>, Security Officers
 <security@...nel.org>, linux-distros@...openwall.org, Will Deacon
 <will@...nel.org>,
 "Williams, Dan J" <dan.j.williams@...el.com>,
 Linus Torvalds <torvalds@...ux-foundation.org>, Oleg Nesterov
 <oleg@...hat.com>,
 "Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>,
 Andrew Morton <akpm@...ux-foundation.org>, Mel Gorman <mgorman@...e.de>
Subject: Re: [vs-plain] User can control PTE value to read/write anywhere,
 when "mremap" a hugepage mmaped DAX file to a mmaped anonymous memory
 region

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.