Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130227191750.GC21286@kroah.com>
Date: Wed, 27 Feb 2013 11:17:50 -0800
From: Greg KH <greg@...ah.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request - Linux kernel: VFAT slab-based
 buffer overflow

On Wed, Feb 27, 2013 at 11:36:32AM -0800, Tim wrote:
> 
> 
> Hmm, I wonder if perhaps the solution here isn't about spending a lot
> of time analyzing hundreds of potentially serious bugs and notifying
> the world about them all in an accurate way.  Perhaps the solution is
> changing the development model or architecture of the kernel such that
> there aren't so many bugs with *serious* impact in the first place.
> 
> Ooops... did I say that out loud?  

There's nothing wrong with that, and we have made many changes in the
kernel to help mitigate problems before they occur.

If you know of any other ways that we can do this, please let us know.

thanks,

greg k-h

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.