|
Message-ID: <CAFswPa-o3rbTauLiQfQtLLP-Cm2BFbKFCEffdbA3iHDLHcUwDg@mail.gmail.com> Date: Mon, 23 May 2022 08:48:27 +0200 From: eduardo vela <evn@...glers.com> To: oss-security@...ts.openwall.com Cc: Sam James <sam@...too.org>, Seth Arnold <seth.arnold@...onical.com> Subject: Re: linux-distros list policy and Linux kernel On Mon, 23 May 2022, 08:35 Greg KH, <greg@...ah.com> wrote: > On Sun, May 22, 2022 at 08:55:50PM +0100, Sam James wrote: > > I'd also like to ask that the final commit messages please reference any > > relevant CVEs or at least the security impact. There've been a fair > number > > of incidents where such information is stripped and it makes tracking > > issues *really* hard. > > That is pretty much impossible and goes against the whole goal of "get > this fixed and in a public tree and only tell the world that it was an > issue after-the-fact" way that the kernel team works. If we put all of > that in the commit to start with, the whole world knows this info. We > can't go back in time and change git commits for obvious reasons. > Hi all Regarding keeping the security relevance of the patch secret. Something we are working on now (as the Google CNA) is to automatically generate CVEs for Syzkaller findings that meet some criteria (unique, with reproducer, and with some heuristics to determine the type of crash, eg KASAN+uaf). We would also monitor advisories from distros to catch duplicate CVEs and not issue them in those cases. The reason I mention it in this list is because a CVE would be issued (and maybe communicated to oss-security@ to avoid duplicate CVEs), which might also automatically break embargos. That said, I hope that's OK, as Syzkaller is just a subset of security vulnerabilities being disclosed on the Kernel. If you have feedback about the overall concept, please send it off-list (or start a new thread) as to avoid derailing the topic, but I wanted to bring it up because it might appear as willing violations of Embargo on the new linux-distros@ process being proposed. Regards thanks, > > gre gk-h >
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.