Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAPBF25cWOQggf9RVXtG9-Hpk6iycrMVKGA73oT4K2e2Yos31Eg@mail.gmail.com>
Date: Mon, 9 Nov 2020 14:42:39 +0530
From: Dhananjay Arunesh <darunesh@...hat.com>
To: "Srivatsa S. Bhat" <srivatsa@...il.mit.edu>
CC: John Haxby <john.haxby@...cle.com>, kiyin(尹亮)
 <kiyin@...cent.com>,
 "security@...nel.org" <security@...nel.org>,
 "linux-distros@...openwall.org" <linux-distros@...openwall.org>,
 huntchen(陈阳) <huntchen@...cent.com>,
 dannywang(王宇) <dannywang@...cent.com>
Subject: Re: [vs-plain] perf_event_parse_addr_filter memory leak

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.