|
Message-ID: <CAADWXX8JYe-AewtzoY6VBVLPTs+UvnfZst76vL4tccf6x9cY=g@mail.gmail.com> Date: Fri, 23 Jun 2017 18:04:00 -0700 From: Linus Torvalds <torvalds@...ux-foundation.org> To: Brad Spengler <spender@...ecurity.net> Cc: oss-security@...ts.openwall.com, pageexec@...email.hu Subject: Re: More CONFIG_VMAP_STACK vulnerabilities, refcount_t UAF, and an ignored Secure Boot bypass / rootkit method On Fri, Jun 23, 2017 at 5:50 PM, Brad Spengler <spender@...ecurity.net> wrote: > > BTW, we're happy to go toe-to-toe with you here in public on actual facts > instead of pathetic ad hominems. Quite frankly, I'd much rather see *you* actually send in patches that are acceptable for inclusion, something you've never done. As it is, other people have tried to clean up parts of the grsecurity patches, and tried to make them acceptable. Wouldn't it be nice if you actually tried to make the baseline actually better? Please. Linus
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.