Konrad Dybcio writes:
> Currently, we blindly trust the submitters that they both compiled their
> code at all, tested it on a relevant device, and have done so in a manner
> that made sense for a given changeset.
>
> If at least two of these three things were always true, the review
> workflow w
The linux-distros list relaxed their rules to try to adapt better to
how the Linux kernel works. Let's update the Coordination part to
explain why and when to contact them or not to and how to avoid trouble
in the future.
Link: https://www.openwall.com/lists/oss-security/2023/09/08/4
Cc: Greg Kroa
On 07/10/2023 16:04, Willy Tarreau wrote:
+As such, the kernel security team strongly recommends that reporters of
+potential security issues DO NOT contact the "linux-distros" mailing
+list BEFORE a fix is accepted by the affected code's maintainers and you
is s/BEFORE/UNTIL/ clearer?
+hav
Hi Vegard,
On Sat, Oct 07, 2023 at 06:30:11PM +0200, Vegard Nossum wrote:
>
> On 07/10/2023 16:04, Willy Tarreau wrote:
> > +As such, the kernel security team strongly recommends that reporters of
> > +potential security issues DO NOT contact the "linux-distros" mailing
> > +list BEFORE a fix is