|
Message-ID: <1362000376.4116.15.camel@scapa>
Date: Wed, 27 Feb 2013 22:26:16 +0100
From: Yves-Alexis Perez <corsac@...ian.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request - Linux kernel: VFAT slab-based
buffer overflow
On mer., 2013-02-27 at 10:05 -0800, Greg KH wrote:
> Yes, I need someone to actually do this. There used to be a Red Hat
> security team member that did this, or so I thought. What happened to
> that process? I'll ask on security@...nel.org if someone wants to
> volunteer to do this, but if not, are you, or anyone else you
> know/trust
> willing to do so?
And do you think it'd be possible to have the same kind of notifications
for (know security) issues not on security@k.o but committed to the
tree? As I understand it networking subsystem patches don't go through
security@k.o so for example I guess the sock_diag_handlers[] one didn't
go through security@k.o but was still identified (at least for some
people) as a security commit?
Regards,
--
Yves-Alexis
Download attachment "signature.asc" of type "application/pgp-signature" (491 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.