Ksummit-Discuss Archive mirror
 help / color / mirror / Atom feed
From: Greg KH <gregkh@linuxfoundation.org>
To: Leon Romanovsky <leon@kernel.org>
Cc: ksummit <ksummit-discuss@lists.linuxfoundation.org>,
	Justin Forbes <jforbes@redhat.com>
Subject: Re: [Ksummit-discuss] [MAINTAINERS SUMMIT] CVE patches annotation
Date: Tue, 11 Sep 2018 17:02:15 +0200	[thread overview]
Message-ID: <20180911150215.GB23019@kroah.com> (raw)
In-Reply-To: <20180911144523.GB5257@mtr-leonro.mtl.com>

On Tue, Sep 11, 2018 at 05:45:23PM +0300, Leon Romanovsky wrote:
> On Tue, Sep 11, 2018 at 04:21:34PM +0200, Greg KH wrote:
> > On Tue, Sep 11, 2018 at 02:00:58PM +0200, Takashi Iwai wrote:
> > > On Tue, 11 Sep 2018 13:57:09 +0200,
> > > Justin Forbes wrote:
> > > >
> > > > On Mon, Sep 10, 2018 at 8:11 PM, Eduardo Valentin <edubezval@gmail.com> wrote:
> > > > > Hello,
> > > > >
> > > > > I would like to open a discussion on improving the annotation
> > > > > around CVE patches on the Linux kernel. Today, the kernel Documentation
> > > > > mentions about CVE assignment and asks as a good practice to at least
> > > > > mention the CVE  number in the patch [1]. But, is that enough?
> > > > > Should the kernel have more info about what patches fixes a specific
> > > > > CVE?
> > > > >
> > > > > Some of the challenges with current process:
> > > > > - The info about of about what CVEs have been patched in a kernel is
> > > > >   outside the kernel tree / git history.
> > > > > - Today, some patches have the CVE info, and many others do not mention
> > > > >   anything about CVE number.
> > > > > - As mentioned in the kernel documentation [1], not always the CVE
> > > > >   number is assigned when the patch(es) go into the kernel tree, so
> > > > >   maybe this may require some post merge annotation?
> > > >
> > > > This is also sometimes relevant when you can fix and embargoed CVE
> > > > before embargo lifts because the actual fix doesn't make it obvious
> > > > that there is a security issue. Obfuscation is a somewhat useful tool
> > > > when fixing security bugs sometimes.  I would rather get the patches
> > > > in sooner than have them be properly annotated for the security fixes
> > > > they really are.
> > >
> > > I hoped that git-notes could be used for such additional post-release
> > > notes.  But it seems that it never flies well due to various
> > > reasons...
> >
> > I do remember a tree somewhere on github that had a tracking between
> > cves and kernel commits.  It was a pain to keep up to date, but the
> > author was doing a good job for a number of months.
> >
> > Can't find it now...
> >
> > Anyway, the main problem here is that almost all the time, CVEs are
> > assigned _after_ the patch is in the kernel tree.  And we can't go back
> > in time to change a changelog entry.
> 
> Greg,
> 
> There is another huge problem - legal complications vs. desire to
> upstream fix as fast as possible.
> 
> Most probably all HW vendors are tied with legal contracts to provide to
> their customers fix to security breach in advance, before making it
> publicly available.
> 
> It means that putting CVE in changelogs will require from such HW
> vendors to delay ALL CVE patches, while current legal situation allows
> them to fix without too much noise and inform all relevant parties in
> parallel.

Yet another good reason why we will never require this :)

thanks for bringing it up,

greg k-h

      reply	other threads:[~2018-09-11 15:02 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-09-11  1:11 [Ksummit-discuss] [MAINTAINERS SUMMIT] CVE patches annotation Eduardo Valentin
2018-09-11 11:57 ` Justin Forbes
2018-09-11 12:00   ` Takashi Iwai
2018-09-11 14:21     ` Greg KH
2018-09-11 14:35       ` Dan Carpenter
2018-09-11 14:37       ` Takashi Iwai
2018-09-11 14:45       ` Leon Romanovsky
2018-09-11 15:02         ` Greg KH [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20180911150215.GB23019@kroah.com \
    --to=gregkh@linuxfoundation.org \
    --cc=jforbes@redhat.com \
    --cc=ksummit-discuss@lists.linuxfoundation.org \
    --cc=leon@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).