Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130227161726.GD21645@kroah.com>
Date: Wed, 27 Feb 2013 08:17:26 -0800
From: Greg KH <greg@...ah.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request - Linux kernel: VFAT slab-based
 buffer overflow

On Wed, Feb 27, 2013 at 02:59:17PM +0000, Benji wrote:
> Ah the logic. Open source software, hidden secret hush hush no public
> reporting patches.

Every single patch we make to the kernel is public, it is up to you to
determine if you feel it is a "security fix" or not.  And to do so is a
non-trivial task, something that I sure don't want to be responsible for
trying to do.  And since no one else has ever stepped up to want to do
it either, there's not much more that can be done.

Are you willing to do it?

greg k-h

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.