[go: up one dir, main page]

oss-sec mailing list archives

Re: linux-distros list policy and Linux kernel, again


From: Seth Arnold <seth.arnold () canonical com>
Date: Sat, 26 Aug 2023 02:31:29 +0000

On Sat, Aug 26, 2023 at 12:23:59AM +0200, Solar Designer wrote:
I'd appreciate any well-reasoned votes and constructive suggestions.
Maybe there are good ideas that didn't cross my mind yet.

I think we'd all be better served to wait until next year before we try to
make changes. Some additional space would probably do everyone some good.

For my own part, I was frustrated getting a dozen emails about the policy
and deadlines and folks saying "we don't even have a fix yet please back
off" etc over and over and over again. There were usually more emails
about the policy than about the issue. I can't speak for the others but
perhaps if we, as a group, were less vocal about the policies on every
single bug report it might have been easier to work together.

For every security issue in the kernel that gets a CVE and The Whole
Process, I'm sure there's five or ten more that go unnoticed by the
wider world. Trying to do The Security Process on the ones that come to
light feels silly when there's far more issues that may allow privilege
escalation that never get the theater treatment. While we can (and should)
try to bring more of these to light we might also reduce the friction on
the ones that do come to light.

I was also annoyed with the endless stream of "I found a security bug in
the kernel, give me a CVE!" that are a mangled syzkaller reproducer and
no work to diagnose the problem or propose a patch. If every syzkaller
issue received a CVE automatically, we'd immediately remove the most
noisome posts.

Here's what I think would help the most, if we in the future try to get
copied on reports "like the old days":

- No replies from distros@ subscribers about list policies. None. distros@
  subscribers can and should feel free to engage about the bug, about
  testing, about concerns, etc. But none about the list policies.

  We all know that the kernel developers don't just sit on reports for
  six months before they're forced to take action by public posts. They
  want fixes in a timely fashion and they're doing the work to deliver
  fixes in a timely fashion.

  They publish their patches in public very soon after the work is
  complete which addresses your concern about the inboxes and mail
  servers being a jackpot of private vulnerabilities.

  We shouldn't harangue them about the policies.

- Make it clear to all that distributions can apply fixes to their kernels
  as soon as patches are in publicly visible trees or mail lists. Trying
  to coordinate dates didn't work well: The kernel people don't want
  to hold off on publishing fixes for an arbitrary reason. The distro
  people have their own cycles for integrating patches, performing quality
  control, preferences to not publish updates on important holidays or
  weekends, etc.

  Let's just let the kernel developers work on fixes on their own schedule
  and whenever they go public, just go with it.

  We shouldn't try to coordinate dates.

- Ask Red Hat's CNA to consider setting up an automatic CVE assignment
  process for syzkaller issues. (Red Hat's CNA is now serving as a Root
  CNA for FOSS issues in general, so it feels like a plausible place to
  put this process. Google runs syzkaller and has four CNAs, perhaps
  one of them would be a better fit. Maybe the Linux Foundation could
  run a CNA for this purpose. I'm not picky.)

  We shouldn't indulge the very-low-effort-researchers who aren't putting
  in much effort but trying to get CVEs.

Thanks

Attachment: signature.asc
Description:


Current thread: