Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <53757b3f-7d72-cb65-477d-235e927b6175@csail.mit.edu>
Date: Wed, 4 Nov 2020 18:00:52 -0800
From: "Srivatsa S. Bhat" <srivatsa@...il.mit.edu>
To: Dan Carpenter <dan.carpenter@...cle.com>, Peter Zijlstra
 <peterz@...radead.org>, Alexander Shishkin
 <alexander.shishkin@...ux.intel.com>, kiyin(尹亮)
 <kiyin@...cent.com>
CC: Ingo Molnar <mingo@...hat.com>, Arnaldo Carvalho de Melo
 <acme@...nel.org>, Mark Rutland <mark.rutland@....com>, Jiri Olsa
 <jolsa@...hat.com>, Namhyung Kim <namhyung@...nel.org>,
 "security@...nel.org" <security@...nel.org>,
 "linux-distros@...openwall.org" <linux-distros@...openwall.org>,
 huntchen(陈阳) <huntchen@...cent.com>,
 dannywang(王宇) <dannywang@...cent.com>
Subject: Re: [vs-plain] [PATCH resend] perf/core: Fix a leak in
 perf_event_parse_addr_filter()

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.