Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 27 Feb 2013 15:07:32 -0800
From: Greg KH <greg@...ah.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request - Linux kernel: VFAT slab-based
 buffer overflow

On Thu, Feb 28, 2013 at 12:00:27AM +0100, Jason A. Donenfeld wrote:
> On Wed, Feb 27, 2013 at 10:44 PM, Greg KH <greg@...ah.com> wrote:
> > That's the whole problem here, who is going to do such a classification,
> > and after that, the notification?  The first part is the toughest to do,
> > as discussed elsewhere in this thread.
> 
> May I just bluntly call out shenanigans here? Yes, some bugs are
> esoteric and it's not immediately obvious that they are security
> related. But there are so many bugs that are _clearly_
> security-related.

Really?  Ok then, please go ahead and try doing this yourself if you
feel it is so "obvious" to do.

> Kernel developers are super smart -- some of the brightest guys out
> there.

Nope, we are dumb, we do uninteresting, boring work, dealing with broken
hardware and demanding users every day.  If we were smarter, we wouldn't
be doing this type of thing.

sorry,

greg k-h

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.