Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 27 Feb 2013 22:26:16 +0100
From: Yves-Alexis Perez <corsac@...ian.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request - Linux kernel: VFAT slab-based
 buffer overflow

On mer., 2013-02-27 at 10:05 -0800, Greg KH wrote:
> Yes, I need someone to actually do this.  There used to be a Red Hat
> security team member that did this, or so I thought.  What happened to
> that process?  I'll ask on security@...nel.org if someone wants to
> volunteer to do this, but if not, are you, or anyone else you
> know/trust
> willing to do so?

And do you think it'd be possible to have the same kind of notifications
for (know security) issues not on security@k.o but committed to the
tree? As I understand it networking subsystem patches don't go through
security@k.o so for example I guess the sock_diag_handlers[] one didn't
go through security@k.o but was still identified (at least for some
people) as a security commit?

Regards,
-- 
Yves-Alexis

Download attachment "signature.asc" of type "application/pgp-signature" (491 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.