Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAHk-=wjj9dz9cos+RKHW9OQJkCKOEOBYmjXrR6ivOUUEN0JkDA@mail.gmail.com>
Date: Thu, 5 Nov 2020 13:13:27 -0800
From: Linus Torvalds <torvalds@...ux-foundation.org>
To: Dan Carpenter <dan.carpenter@...cle.com>
CC: Peter Zijlstra <peterz@...radead.org>, 	Alexander Shishkin
 <alexander.shishkin@...ux.intel.com>, kiyin(尹亮)
 <kiyin@...cent.com>, 	Ingo Molnar <mingo@...hat.com>, Arnaldo Carvalho de
 Melo <acme@...nel.org>, Mark Rutland <mark.rutland@....com>,
 Jiri Olsa <jolsa@...hat.com>, Namhyung Kim <namhyung@...nel.org>,
 "security@...nel.org" <security@...nel.org>,
 "linux-distros@...openwall.org" <linux-distros@...openwall.org>,
 huntchen(陈阳) <huntchen@...cent.com>,
 dannywang(王宇) <dannywang@...cent.com>
Subject: [vs-plain] Re: [PATCH resend] perf/core: Fix a leak in
 perf_event_parse_addr_filter()

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.