Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 23 Jun 2017 18:04:00 -0700
From: Linus Torvalds <torvalds@...ux-foundation.org>
To: Brad Spengler <spender@...ecurity.net>
Cc: oss-security@...ts.openwall.com, pageexec@...email.hu
Subject: Re: More CONFIG_VMAP_STACK vulnerabilities, refcount_t UAF, and an
 ignored Secure Boot bypass / rootkit method

On Fri, Jun 23, 2017 at 5:50 PM, Brad Spengler <spender@...ecurity.net> wrote:
>
> BTW, we're happy to go toe-to-toe with you here in public on actual facts
> instead of pathetic ad hominems.

Quite frankly, I'd much rather see *you* actually send in patches that
are acceptable for inclusion, something you've never done.

As it is, other people have tried to clean up parts of the grsecurity
patches, and tried to make them acceptable.

Wouldn't it be nice if you actually tried to make the baseline actually better?

Please.

                Linus

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ