|
Message-ID: <CAJjojJu4y96+mMEWQ_Qg1Bb+z=SP0FYqMBi24dBryr=7aQ9kWg@mail.gmail.com> Date: Tue, 26 Oct 2021 20:14:20 +0800 From: Lin Horse <kylin.formalin@...il.com> To: Solar Designer <solar@...nwall.com> Cc: oss-security@...ts.openwall.com Subject: Re: CVE-2021-3760: Linux kernel: Use-After-Free vulnerability of ndev->rf_conn_info object Hi Alexander, Thanks for the reply > 1. The original notification by Lin to linux-distros did include "I'd > like to ask for 14 days of the embargo", which is OK'ish, but ideally > such messages should include the proposed public disclosure date/time - > and that's what the instructions ask for. When it's just "N days", I > guess people think "that's OK'ish" and move on. When it's a specific > date/time, it's easier for everyone to notice it approaching - not only > for people specifically tasked with that. That's just a psychological > detail that I guess nevertheless statistically affects the outcomes. > > So I think that the distros tasked with reviewing initial notifications > should insist on the actual date/time being present in there, or add it > on their own in an immediate follow-up. Those distros currently are > Oracle and Wind River. I'd appreciate them confirming that they accept > this clarification. Gotcha, I was always got confused about the embargo date and public disclosure data/time. This suggestion is great. > "Promptly review new issue reports for meeting the list's requirements > and confirm receipt of the report and, when necessary, inform the > reporter of any issues with their report (e.g., obviously not actionable > by the distros) and request and/or propose any required yet missing > information (most notably, a tentative public disclosure date/time) - > primary: Oracle, backup: Wind River" > > 2. While Lin's original message to linux-distros included a "SUGGESTED > FIX" section (with a patch in it) and "I will do my best to work with > the developer on fixing this", no further messages on a fix were sent to > linux-distros. Lin, if you did in fact work with upstream on this, you > should have kept linux-distros aware of the progress, and especially of > the fix getting to public Linux kernel mailing lists or public commits, > as that ends the embargo. I have no idea about that before today. This is quite sense-making as I was once thought that I only need to send the original report and wait. Now I understand what I should do to with both sides. > Further, distros failed to handle the corresponding "contributing back" > tasks. There was no activity by Gentoo lately at all, and while there > is recent helpful activity by Amazon, they didn't act this time. > > "Stay on top of issues to ensure progress is being made, remind others > when there's no apparent progress, as well as when the public disclosure > date for an issue is approaching and when it's finally reached (unless > the reporter beats you to it by making their mandatory posting to > oss-security first) - primary: Gentoo, backup: Amazon > > Monitor relevant public channels (mailing lists, code repositories, > etc.) and inform the reporter and the list in case an issue is made > public prematurely (that is, leaks or is independently rediscovered) - > primary: Amazon, backup: SUSE > > Make sure the mandatory oss-security posting is made promptly and is > sufficiently detailed, and remind the reporter if not - primary: Gentoo, > backup: Amazon" > > I'd like replies by Gentoo and Amazon on this, please. They should > either state that they'd be handling these tasks from this point on, or > we should reassign the tasks. > > Incidentally, I've already unassigned the statistics task from Gentoo > and Amazon a while ago, as that one was obviously not handled by them. > We still need another distro or two to volunteer for this one. As I had > mentioned, an important desirable side-effect of keeping the statistics > up-to-date is that this would catch issues that were not reported to > oss-security in time or at all. For example, if someone were updating > statistics for September on October 15 (by which point nothing from > September is supposed to still be embargoed), they'd catch this issue > 10 days earlier. > > 3. The only "contributing back" activity on this issue consisted of 3 > postings to linux-distros: prompt CVE ID assignment by Red Hat, a > reminder about 14 days having passed by SUSE on September 17 (that is, > already 3 days past the embargo period end), and another reminder by (a > different engineer from) SUSE on October 25 (this one worked). > > SUSE isn't formally tasked with this - Gentoo and Amazon are - but SUSE > happened to do it - thanks! SUSE is formally a backup for "Monitor > relevant public channels ...", which I guess could have worked as well, > but in this case the embargo period was already over by the time SUSE > first commented, so that aspect was irrelevant by then. > > 4. There's still no (reference to) fix for this issue on oss-security. > Lin, you write "2021-10-26 patch upstream" - can you please refer to the > actual upstream commit? Also, can you please let us all know when the > patch became public (possibly first on a public mailing list)? The commit for the fix is 1b1499a817c90fd1ce9453a2c98d2a01cca0e775 (link: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1b1499a817c90fd1ce9453a2c98d2a01cca0e775 ) > This issue itself is not that important, which is part of why it almost > slipped through the cracks, but it's our reminder and opportunity to fix > things before anything more important is mishandled. > Alexander > P.S. The Subject of this message as sent by Lin to oss-security > contained only the CVE ID and no description. I took the liberty to > edit it, adding the Subject string that was used on linux-distros, > before approving the message as list moderator. Thanks about that >.< And thanks for all the replies again, I will summarize these and try to make the people around me clear about that. Best wishes Lin Solar Designer <solar@...nwall.com> 于2021年10月26日周二 下午8:00写道: > On Tue, Oct 26, 2021 at 02:37:20PM +0800, Lin Horse wrote: > > 2021-09-01 Report to security and linux-distro > > 2021-09-01 CVE-2021-3760 assigned > > 2021-10-26 patch upstream > > > > Sorry for the delay of this report T.T > > Ouch. Let's use this opportunity to learn from the mishandling of this > issue and avoid that for other issues. Many things went wrong here: > > 1. The original notification by Lin to linux-distros did include "I'd > like to ask for 14 days of the embargo", which is OK'ish, but ideally > such messages should include the proposed public disclosure date/time - > and that's what the instructions ask for. When it's just "N days", I > guess people think "that's OK'ish" and move on. When it's a specific > date/time, it's easier for everyone to notice it approaching - not only > for people specifically tasked with that. That's just a psychological > detail that I guess nevertheless statistically affects the outcomes. > > So I think that the distros tasked with reviewing initial notifications > should insist on the actual date/time being present in there, or add it > on their own in an immediate follow-up. Those distros currently are > Oracle and Wind River. I'd appreciate them confirming that they accept > this clarification. > > "Promptly review new issue reports for meeting the list's requirements > and confirm receipt of the report and, when necessary, inform the > reporter of any issues with their report (e.g., obviously not actionable > by the distros) and request and/or propose any required yet missing > information (most notably, a tentative public disclosure date/time) - > primary: Oracle, backup: Wind River" > > 2. While Lin's original message to linux-distros included a "SUGGESTED > FIX" section (with a patch in it) and "I will do my best to work with > the developer on fixing this", no further messages on a fix were sent to > linux-distros. Lin, if you did in fact work with upstream on this, you > should have kept linux-distros aware of the progress, and especially of > the fix getting to public Linux kernel mailing lists or public commits, > as that ends the embargo. > > Further, distros failed to handle the corresponding "contributing back" > tasks. There was no activity by Gentoo lately at all, and while there > is recent helpful activity by Amazon, they didn't act this time. > > "Stay on top of issues to ensure progress is being made, remind others > when there's no apparent progress, as well as when the public disclosure > date for an issue is approaching and when it's finally reached (unless > the reporter beats you to it by making their mandatory posting to > oss-security first) - primary: Gentoo, backup: Amazon > > Monitor relevant public channels (mailing lists, code repositories, > etc.) and inform the reporter and the list in case an issue is made > public prematurely (that is, leaks or is independently rediscovered) - > primary: Amazon, backup: SUSE > > Make sure the mandatory oss-security posting is made promptly and is > sufficiently detailed, and remind the reporter if not - primary: Gentoo, > backup: Amazon" > > I'd like replies by Gentoo and Amazon on this, please. They should > either state that they'd be handling these tasks from this point on, or > we should reassign the tasks. > > Incidentally, I've already unassigned the statistics task from Gentoo > and Amazon a while ago, as that one was obviously not handled by them. > We still need another distro or two to volunteer for this one. As I had > mentioned, an important desirable side-effect of keeping the statistics > up-to-date is that this would catch issues that were not reported to > oss-security in time or at all. For example, if someone were updating > statistics for September on October 15 (by which point nothing from > September is supposed to still be embargoed), they'd catch this issue > 10 days earlier. > > 3. The only "contributing back" activity on this issue consisted of 3 > postings to linux-distros: prompt CVE ID assignment by Red Hat, a > reminder about 14 days having passed by SUSE on September 17 (that is, > already 3 days past the embargo period end), and another reminder by (a > different engineer from) SUSE on October 25 (this one worked). > > SUSE isn't formally tasked with this - Gentoo and Amazon are - but SUSE > happened to do it - thanks! SUSE is formally a backup for "Monitor > relevant public channels ...", which I guess could have worked as well, > but in this case the embargo period was already over by the time SUSE > first commented, so that aspect was irrelevant by then. > > 4. There's still no (reference to) fix for this issue on oss-security. > Lin, you write "2021-10-26 patch upstream" - can you please refer to the > actual upstream commit? Also, can you please let us all know when the > patch became public (possibly first on a public mailing list)? > > This issue itself is not that important, which is part of why it almost > slipped through the cracks, but it's our reminder and opportunity to fix > things before anything more important is mishandled. > > Alexander > > P.S. The Subject of this message as sent by Lin to oss-security > contained only the CVE ID and no description. I took the liberty to > edit it, adding the Subject string that was used on linux-distros, > before approving the message as list moderator. >
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.