Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 16 Mar 2011 16:26:53 +0000
From: "Menkhus, Mark (GSE Security HP SSRT)" <>
To: Eugene Teo <>, ""
Subject: RE: Vendor-sec hosting and future of closed lists

Thanks Eugene,

I have been looking at how to contribute in FOSS and security, and for me
it's been in the area of how to understand what vulnerabilities are already
documented.  I might think about looking more at the kernel changelogs and
LKML lists.

For sure, I'll look for some bugs while I am at it, tho.

> -----Original Message-----
> From: Eugene Teo []
> Sent: Tuesday, March 15, 2011 11:45 PM
> To:
> Cc: Menkhus, Mark (GSE Security HP SSRT)
> Subject: Re: [oss-security] Vendor-sec hosting and future of closed
> lists
> On 03/16/2011 12:07 PM, Menkhus, Mark (GSE Security HP SSRT) wrote:
> [...]
> > Not being the one fixing the code for our kernel left me with little
> to
> > immediately contribute, but I requested and coordinated with several
> folks
> > who got vendor sec for HP.  Likely, we would still want to be part of
> >
> Many of the kernel vulnerabilities I have seen over the past two years
> at least, were reported and fixed upstream. Only a handful of them were
> reported privately. I can't remember when was the last time we had a
> kernel issue reported via vendor-sec. There were, but it must have been
> quite some time ago. LKML is still one of the better places to find
> vulnerabilities :) Contributions welcomed.
> Eugene
> --
> main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }

Download attachment "smime.p7s" of type "application/x-pkcs7-signature" (4916 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.