Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20170804180037.GB18494@kroah.com>
Date: Fri, 4 Aug 2017 11:00:37 -0700
From: Greg KH <greg@...ah.com>
To: oss-security@...ts.openwall.com
Cc: Andrey Konovalov <andreyknvl@...il.com>,
	willemdebruijn.kernel@...il.com, Dmitry Vyukov <dvyukov@...gle.com>,
	Kostya Serebryany <kcc@...gle.com>
Subject: Re: Reporting and disclosing Linux kernel
 vulnerabilities

On Fri, Aug 04, 2017 at 07:36:58PM +0200, Solar Designer wrote:
> I hear that for netdev bugs, security@k.o is likely to ask you to post
> such bugs to the public netdev list right away, without any embargo.
> You could want to see whether this is in fact the case, and adjust your
> instructions if so.

Yes, that is the case, and has happened in the past, but now
security@k.o has a few network developers on it to help out before it
hits the public list, if necessary.

thanks,

greg k-h

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.