From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S262699AbVAJVfQ (ORCPT ); Mon, 10 Jan 2005 16:35:16 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S262646AbVAJVel (ORCPT ); Mon, 10 Jan 2005 16:34:41 -0500 Received: from mail.enyo.de ([212.9.189.167]:63408 "EHLO mail.enyo.de") by vger.kernel.org with ESMTP id S262686AbVAJVby (ORCPT ); Mon, 10 Jan 2005 16:31:54 -0500 From: Florian Weimer To: Steve Bergman Cc: linux-kernel@vger.kernel.org Subject: Re: Proper procedure for reporting possible security vulnerabilities? References: <41E2B181.3060009@rueb.com> Date: Mon, 10 Jan 2005 22:31:47 +0100 In-Reply-To: <41E2B181.3060009@rueb.com> (Steve Bergman's message of "Mon, 10 Jan 2005 10:46:57 -0600") Message-ID: <87d5wdhsxo.fsf@deneb.enyo.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org * Steve Bergman: > So what is the preferred procedure and is it documented somewhere? Contact your vendor. You are using vendor kernels, are you? 8-)