Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20201116201020.ta7nkdve2g4c5coq@yuggoth.org>
Date: Mon, 16 Nov 2020 20:10:20 +0000
From: Jeremy Stanley <fungi@...goth.org>
To: oss-security@...ts.openwall.com
Subject: Re: Buffer Overflow in raptor widely unfixed in Linux
 distros

On 2020-11-16 20:06:15 +0100 (+0100), Marius Bakke wrote:
[...]
> How do other distros keep up with new CVE assignments?
[...]

While I can't speak from the distro side of things, the projects I
work on have a policy that a copy of all security advisories are
sent to this ML (and also possibly the private linux-distros ML
first if the vulnerability is being fixed under embargo via
coordinated disclosure).
-- 
Jeremy Stanley

Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.