lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 5 Feb 2019 17:03:40 -0500 From: Sven Van Asbroeck <thesven73@...il.com> To: Dmitry Torokhov <dmitry.torokhov@...il.com> Cc: Jacek Anaszewski <jacek.anaszewski@...il.com>, Tejun Heo <tj@...nel.org>, Lai Jiangshan <jiangshanlai@...il.com>, Linux Kernel Mailing List <linux-kernel@...r.kernel.org>, Sebastian Reichel <sre@...nel.org>, Kees Cook <keescook@...omium.org> Subject: Re: [RFC v1 3/3] cap11xx: fix potential user-after-free on module unload On Tue, Feb 5, 2019 at 4:43 PM Dmitry Torokhov <dmitry.torokhov@...il.com> wrote: > > OK, great, I'll write up a patch for cap11xx and others if I find them. > Possibly also drivers/input/keyboard/lm8323.c
Powered by blists - more mailing lists