[go: up one dir, main page]

|
|
Log in / Subscribe / Register

Opening up kernel security bug handling

Opening up kernel security bug handling

Posted Sep 17, 2013 2:37 UTC (Tue) by kurtseifried (guest, #57307)
In reply to: Opening up kernel security bug handling by error27
Parent article: Opening up kernel security bug handling

It's not like we've made it hard to get CVE's, I've been at Red Hat for 2 years now (as of last week), took over CVE assignments early on.

http://people.redhat.com/kseifrie/CVE-OpenSource-Request-...

the afore mentioned methods will work to get CVEs, you can also request them privately (but for linux kernel stuff especially the distros@ list is much preferred as this also ensures all the large Linux vendors get notified.


to post comments

Opening up kernel security bug handling

Posted Sep 17, 2013 12:27 UTC (Tue) by error27 (subscriber, #8346) [Link]

It's not clear why more kernel developers don't file for CVEs.

One reason is maybe that people prefer silent fixes.
http://www.pcpro.co.uk/news/security/213213/torvalds-rage...
Personally, I feel that these days the danger is not about script kiddies so we should just spell out the danger.

One thing is that maintainers already have enough things to do. It's ridiculous to imagine that Greg K-H is going to do all the security analysis by himself. Anyone can file for CVEs if the want to. Greg thinks that distros already do that job and are able to understand which -stable patches have security impacts.
https://lwn.net/Articles/539282/

As a kernel contributor, I decided I would let the individual maintainers decide for themselves how they want to handle security bugs. I always spell out the implications. So far no maintainers have ever filed for a CVE but occasionally P J P will tag one of my patches.
http://www.spinics.net/lists/stable/msg16881.html
I pretty much agree with Greg on that. One byte of stack info seems like a minor thing.

A lot of the time, I don't know the security implications myself. Which parts of the code are root only? Is an off-by-one check just a sanity check and can't ever be triggered? If we read one space beyond the end of the array is that a problem?


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds