Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 27 Feb 2013 10:02:48 -0800
From: Greg KH <greg@...ah.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request - Linux kernel: VFAT slab-based
 buffer overflow

On Wed, Feb 27, 2013 at 06:46:30PM +0100, Jason A. Donenfeld wrote:
> On Wed, Feb 27, 2013 at 5:17 PM, Greg KH <greg@...ah.com> wrote:
> > Are you willing to do it?
> 
> If it's a patch for an issue sent to security@, then it is, in fact, a
> "trivial task" as to whether or not it was a security fix. There's no
> issue of responsibility of judgement, at all.

That's not true at all, lots of things sent to security@ end up not
being security issues when they are fixed.  Then there's the issue of
"what is and is not a security fix", and that is a discussion that we
aren't going to have here, sorry.

One problem is that there are very few things reported and fixed through
security@.  Maybe one patch every other kernel release or so.  And some
subsystems (i.e. networking) refuse to go through the security alias.

The _large_ majority of all fixes go through their individual subsystem
development process, and those are the ones you should be searching
through the commit logs for, as this patch itself proves.

thanks,

greg k-h

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.