Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20240222200542.GA14535@openwall.com>
Date: Thu, 22 Feb 2024 21:05:42 +0100
From: Solar Designer <solar@...nwall.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVEs issued by the Linux kernel CNA

On Tue, Feb 20, 2024 at 03:30:28PM -0800, Alan Coopersmith wrote:
> As recently announced [1], kernel.org is now a CNA for the Linux kernel, and

See also discussion here:

https://lwn.net/Articles/961961/

> today issued its first 8 CVEs, as seen in the archives of their mailing list
> at https://lore.kernel.org/linux-cve-announce/ .

There are many more already, all of them also archived at:

https://lists.openwall.net/linux-cve-announce/

> Their documentation [2] warns that we should expect a "seemingly large 
> number of CVEs that are issued by the Linux kernel team".
> 
> Since there's already an archived mailing list covering the CVE assignments,
> I don't think it makes sense to mirror that large amount of traffic here, 
> but to only bring to oss-security those that are especially interesting or 
> useful to discuss further.  What do others think?
> 
> [1] http://www.kroah.com/log/blog/2024/02/13/linux-is-a-cna/
> [2] https://docs.kernel.org/process/cve.html

Yes, I agree.  Besides "especially interesting or useful to discuss
further", another exception will be for issues that were brought to
linux-distros, for transparency.

Speaking of which, we allow for CVEs to be requested via linux-distros,
to be assigned by one of the CNAs in there.  The current Linux kernel
CVE documentation is very strict about rejecting such third-party
assignments if they're "for an actively supported kernel":

"Any CVE that is assigned against the Linux kernel for an actively
supported kernel version, by any group other than the kernel assignment
CVE team should not be treated as a valid CVE. Please notify the kernel
CVE assignment team at <cve@...nel.org> so that they can work to
invalidate such entries through the CNA remediation process."

So I guess we should now exclude upstream actively supported kernels
from this offer/practice.  Distro CNAs can still assign CVEs for issues
limited to downstream/distro kernels and for issues in upstream kernels
that are not currently supported upstream.  I guess they can also assign
CVEs against downstream/distro kernels even if the code is the same as
in an upstream actively supported kernel, but the threat model is
different (e.g., untrusted filesystem images are brought into the threat
model in a distro).  Sounds right?

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.