Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 11 Oct 2016 17:01:03 +0200
From: Greg KH <greg@...ah.com>
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: Re: linux kernel do_blockdev_direct_IO invalid memory
 access

On Tue, Oct 11, 2016 at 04:46:45PM +0200, Greg KH wrote:
> On Tue, Oct 11, 2016 at 10:22:48PM +0800, Marco Grassi wrote:
> > Hello,
> > 
> > I posted this to ask feedback on security at kernel dot org, but I think my
> > mail got bounced back. Not sure if from the mailing list or from some
> > single recipient.
> 
> It got there, you could have given us a few more hours to respond,
> especially as most of the USA was still asleep, and others of us were in
> a conference during the day in Europe. :(

To be specific, you only gave us one hour advance notice.  Now normally
the kernel security team is fast, but expecting a response that quickly
is a bit disingenuous...

greg "even I sleep sometimes" k-h

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.