Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <51a34866-be60-fed2-f2c5-f82d31f34624@iogearbox.net>
Date: Tue, 25 Jan 2022 12:10:23 +0100
From: Daniel Borkmann <daniel@...earbox.net>
To: Salvatore Bonaccorso <carnil@...ian.org>, tr3e wang <tr3e.wang@...il.com>
CC: Roxana Bradescu <roxana.bradescu@...cle.com>, Solar Designer
 <solar@...nwall.com>, Marian Rehak <mrehak@...hat.com>, Thadeu Lima de
 Souza Cascardo <cascardo@...onical.com>,
 "linux-distros@...openwall.org" <linux-distros@...openwall.org>,
 "aliguori@...zon.com" <aliguori@...zon.com>,
 ast@...nel.org, john.haxby@...cle.com
Subject: Re: [vs-plain] Linux/Kernel: eBPF Improper Input Validation
 Privilege Escalation Vulnerability

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.