Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <78666C40-B4EC-4C79-A2A1-B01C5E949855@oracle.com>
Date: Thu, 13 Jan 2022 23:34:42 +0000
From: Roxana Bradescu <roxana.bradescu@...cle.com>
To: Solar Designer <solar@...nwall.com>
CC: Marian Rehak <mrehak@...hat.com>, tr3e wang <tr3e.wang@...il.com>,
 Daniel Borkmann <daniel@...earbox.net>,        Thadeu Lima de Souza
 Cascardo	<cascardo@...onical.com>,        Salvatore Bonaccorso
 <carnil@...ian.org>,
 "linux-distros@...openwall.org" <linux-distros@...openwall.org>,
 "aliguori@...zon.com" <aliguori@...zon.com>
Subject: Re: [vs-plain] Linux/Kernel: eBPF Improper Input Validation
 Privilege Escalation Vulnerability

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.