|
Message-ID: <20201116201020.ta7nkdve2g4c5coq@yuggoth.org>
Date: Mon, 16 Nov 2020 20:10:20 +0000
From: Jeremy Stanley <fungi@...goth.org>
To: oss-security@...ts.openwall.com
Subject: Re: Buffer Overflow in raptor widely unfixed in Linux
distros
On 2020-11-16 20:06:15 +0100 (+0100), Marius Bakke wrote:
[...]
> How do other distros keep up with new CVE assignments?
[...]
While I can't speak from the distro side of things, the projects I
work on have a policy that a copy of all security advisories are
sent to this ML (and also possibly the private linux-distros ML
first if the vulnerability is being fixed under embargo via
coordinated disclosure).
--
Jeremy Stanley
Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.