Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAADWXX8JYe-AewtzoY6VBVLPTs+UvnfZst76vL4tccf6x9cY=g@mail.gmail.com>
Date: Fri, 23 Jun 2017 18:04:00 -0700
From: Linus Torvalds <torvalds@...ux-foundation.org>
To: Brad Spengler <spender@...ecurity.net>
Cc: oss-security@...ts.openwall.com, pageexec@...email.hu
Subject: Re: More CONFIG_VMAP_STACK vulnerabilities, refcount_t UAF, and an
 ignored Secure Boot bypass / rootkit method

On Fri, Jun 23, 2017 at 5:50 PM, Brad Spengler <spender@...ecurity.net> wrote:
>
> BTW, we're happy to go toe-to-toe with you here in public on actual facts
> instead of pathetic ad hominems.

Quite frankly, I'd much rather see *you* actually send in patches that
are acceptable for inclusion, something you've never done.

As it is, other people have tried to clean up parts of the grsecurity
patches, and tried to make them acceptable.

Wouldn't it be nice if you actually tried to make the baseline actually better?

Please.

                Linus

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.