diff for duplicates of <20190528170244.GF32006@arrakis.emea.arm.com> diff --git a/a/1.txt b/N1/1.txt index 0fc25d2..e02db74 100644 --- a/a/1.txt +++ b/N1/1.txt @@ -1,4 +1,4 @@ -On Thu, May 23, 2019 at 02:31:16PM -0700, Kees Cook wrote: +On Thu, May 23, 2019@02:31:16PM -0700, Kees Cook wrote: > syzkaller already attempts to randomly inject non-canonical and > 0xFFFF....FFFF addresses for user pointers in syscalls in an effort to > find bugs like CVE-2017-5123 where waitid() via unchecked put_user() was diff --git a/a/content_digest b/N1/content_digest index 21030e7..6d29c3a 100644 --- a/a/content_digest +++ b/N1/content_digest @@ -8,12 +8,12 @@ "ref\0201905230917.DEE7A75EF0@keescook\0" "ref\020190523174345.6sv3kcipkvlwfmox@mbp\0" "ref\0201905231327.77CA8D0A36@keescook\0" - "From\0catalin.marinas at arm.com (Catalin Marinas)\0" + "From\0catalin.marinas@arm.com (Catalin Marinas)\0" "Subject\0[PATCH v15 00/17] arm64: untag user pointers passed to the kernel\0" "Date\0Tue, 28 May 2019 18:02:45 +0100\0" "\00:1\0" "b\0" - "On Thu, May 23, 2019 at 02:31:16PM -0700, Kees Cook wrote:\n" + "On Thu, May 23, 2019@02:31:16PM -0700, Kees Cook wrote:\n" "> syzkaller already attempts to randomly inject non-canonical and\n" "> 0xFFFF....FFFF addresses for user pointers in syscalls in an effort to\n" "> find bugs like CVE-2017-5123 where waitid() via unchecked put_user() was\n" @@ -75,4 +75,4 @@ "-- \n" Catalin -c37b3e7bda2a4ddeef50da52cf374810f7f4d713f6a5c0c3d6a2b0b5864c65a1 +b81c885f62fec0031db5e11b8d528168e4b37f2f34459e612d767bf9fa75abb5
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox