From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from smtp1.linuxfoundation.org (smtp1.linux-foundation.org [172.17.192.35]) by mail.linuxfoundation.org (Postfix) with ESMTPS id 53286EDB for ; Tue, 11 Sep 2018 14:35:54 +0000 (UTC) Received: from userp2130.oracle.com (userp2130.oracle.com [156.151.31.86]) by smtp1.linuxfoundation.org (Postfix) with ESMTPS id D423A716 for ; Tue, 11 Sep 2018 14:35:53 +0000 (UTC) Date: Tue, 11 Sep 2018 17:35:42 +0300 From: Dan Carpenter To: Greg KH Message-ID: <20180911143542.4yhx6l5sshsm75cu@mwanda> References: <20180911011056.GA6958@localhost.localdomain> <20180911142134.GB19866@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180911142134.GB19866@kroah.com> Cc: Justin Forbes , ksummit Subject: Re: [Ksummit-discuss] [MAINTAINERS SUMMIT] CVE patches annotation List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , On Tue, Sep 11, 2018 at 04:21:34PM +0200, Greg KH wrote: > On Tue, Sep 11, 2018 at 02:00:58PM +0200, Takashi Iwai wrote: > > On Tue, 11 Sep 2018 13:57:09 +0200, > > Justin Forbes wrote: > > > > > > On Mon, Sep 10, 2018 at 8:11 PM, Eduardo Valentin wrote: > > > > Hello, > > > > > > > > I would like to open a discussion on improving the annotation > > > > around CVE patches on the Linux kernel. Today, the kernel Documentation > > > > mentions about CVE assignment and asks as a good practice to at least > > > > mention the CVE number in the patch [1]. But, is that enough? > > > > Should the kernel have more info about what patches fixes a specific > > > > CVE? > > > > > > > > Some of the challenges with current process: > > > > - The info about of about what CVEs have been patched in a kernel is > > > > outside the kernel tree / git history. > > > > - Today, some patches have the CVE info, and many others do not mention > > > > anything about CVE number. > > > > - As mentioned in the kernel documentation [1], not always the CVE > > > > number is assigned when the patch(es) go into the kernel tree, so > > > > maybe this may require some post merge annotation? > > > > > > This is also sometimes relevant when you can fix and embargoed CVE > > > before embargo lifts because the actual fix doesn't make it obvious > > > that there is a security issue. Obfuscation is a somewhat useful tool > > > when fixing security bugs sometimes. I would rather get the patches > > > in sooner than have them be properly annotated for the security fixes > > > they really are. > > > > I hoped that git-notes could be used for such additional post-release > > notes. But it seems that it never flies well due to various > > reasons... > > I do remember a tree somewhere on github that had a tracking between > cves and kernel commits. It was a pain to keep up to date, but the > author was doing a good job for a number of months. > > Can't find it now... Eugene Teo ran one. But that was years ago. It's probably easier to just use the Ubuntu break/fix CVE list. https://launchpad.net/ubuntu-cve-tracker regards, dan carpenter