Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <a5fd8c4b-67be-a8f9-d5a5-08f6d2921473@iogearbox.net>
Date: Mon, 10 Jan 2022 21:51:36 +0100
From: Daniel Borkmann <daniel@...earbox.net>
To: Solar Designer <solar@...nwall.com>
CC: Thadeu Lima de Souza Cascardo <cascardo@...onical.com>, tr3e wang
 <tr3e.wang@...il.com>, Salvatore Bonaccorso <carnil@...ian.org>,
 linux-distros@...openwall.org, aliguori@...zon.com
Subject: Re: [vs-plain] Linux/Kernel: eBPF Improper Input Validation
 Privilege Escalation Vulnerability

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.