workflows.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: "Jürgen Groß" <jgross@suse.com>
Cc: corbet@lwn.net, workflows@vger.kernel.org,
	linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org,
	security@kernel.org, linux@leemhuis.info,
	Kees Cook <keescook@chromium.org>,
	Konstantin Ryabitsev <konstantin@linuxfoundation.org>,
	Krzysztof Kozlowski <krzk@kernel.org>,
	Lukas Bulwahn <lukas.bulwahn@gmail.com>,
	Sasha Levin <sashal@kernel.org>, Lee Jones <lee@kernel.org>
Subject: Re: [PATCH v4] Documentation: Document the Linux Kernel CVE process
Date: Thu, 15 Feb 2024 18:49:04 +0100	[thread overview]
Message-ID: <2024021557-remedial-mutilated-63c6@gregkh> (raw)
In-Reply-To: <0bd8c620-7f80-44c4-ade3-b3d7951b48d8@suse.com>

On Thu, Feb 15, 2024 at 04:03:02PM +0100, Jürgen Groß wrote:
> On 15.02.24 13:10, Greg Kroah-Hartman wrote:
> > The Linux kernel project now has the ability to assign CVEs to fixed
> > issues, so document the process and how individual developers can get a
> > CVE if one is not automatically assigned for their fixes.
> > 
> > Reviewed-by: Kees Cook <keescook@chromium.org>
> > Reviewed-by: Konstantin Ryabitsev <konstantin@linuxfoundation.org>
> > Reviewed-by: Krzysztof Kozlowski <krzk@kernel.org>
> > Reviewed-by: Lukas Bulwahn <lukas.bulwahn@gmail.com>
> > Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
> > Signed-off-by: Sasha Levin <sashal@kernel.org>
> > Signed-off-by: Lee Jones <lee@kernel.org>
> > ---
> > v4: Add MAINTAINER entry
> >      Lots of tiny wording changes based on many reviews
> >      Collected some Reviewed-by: tags
> >      Fixed documenation build by properly referencing the security
> >      process documentation file.
> > v3: fix up wording in security-bugs.rst based on the changes to the cve
> >      assignment process from v1, thanks to a private reviewer for
> >      pointing that out.
> > v2: Grammer fixes based on review from Randy
> >      Updated paragraph about how CVE identifiers will be assigned
> >      (automatically when added to stable trees, or ask us for one
> >      directly before that happens if so desired)
> > 
> >   Documentation/process/cve.rst           | 120 ++++++++++++++++++++++++
> >   Documentation/process/index.rst         |   1 +
> >   Documentation/process/security-bugs.rst |   5 +-
> >   MAINTAINERS                             |   5 +
> >   4 files changed, 128 insertions(+), 3 deletions(-)
> >   create mode 100644 Documentation/process/cve.rst
> > 
> > diff --git a/Documentation/process/cve.rst b/Documentation/process/cve.rst
> > new file mode 100644
> > index 000000000000..6b244d938694
> > --- /dev/null
> > +++ b/Documentation/process/cve.rst
> > @@ -0,0 +1,120 @@
> 
> ...
> 
> > +Invalid CVEs
> > +------------
> > +
> > +If a security issue is found in a Linux kernel that is only supported by
> > +a Linux distribution due to the changes that have been made by that
> > +distribution, or due to the distribution supporting a kernel version
> > +that is no longer one of the kernel.org supported releases, then a CVE
> > +can not be assigned by the Linux kernel CVE team, and must be asked for
> > +from that Linux distribution itself.
> > +
> > +Any CVE that is assigned against the Linux kernel for an actively
> > +supported kernel version, by any group other than the kernel assignment
> > +CVE team should not be treated as a valid CVE.  Please notify the
> > +kernel CVE assignment team at <cve@kernel.org> so that they can work to
> > +invalidate such entries through the CNA remediation process.
> 
> Today we (the Xen security team) are allocating CVEs for Xen-related
> kernel security bugs.
> 
> Does this mean we should do that via cve@kernel.org in future, or are
> you happy us continuing our process as today? If the latter, I think
> this should be noted somehow in this document in order to avoid complaints
> regarding CVEs allocated by us.
> 
> 
> Juergen (on behalf of the Xen security team)

That's a good question, and from what I can tell for the "rules" here,
yes, we need to coordinate somehow for anything that is Linux
kernel-only.  Just email us and ask us for an id and our tools can take
it from there for the submission and other stuff, so hopefully this will
make things easier.

For stuff that crosses both sides (Xen and Linux), you are free to
create your own CVE and then use that identifier in the kernel patch
like you have in the past as I would consider Xen being the "primary"
CNA, don't you?

Is that ok?  We want to make this as easy as possible, so I don't want
to get in the way of your existing process if at all possible.

thanks,

greg k-h

  reply	other threads:[~2024-02-15 17:49 UTC|newest]

Thread overview: 10+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-02-15 12:10 Greg Kroah-Hartman
2024-02-15 15:03 ` Jürgen Groß
2024-02-15 17:49   ` Greg Kroah-Hartman [this message]
2024-02-16  8:04     ` Jürgen Groß
2024-02-15 17:38 ` Jiri Kosina
2024-02-15 18:24   ` Greg Kroah-Hartman
2024-02-16 19:26 ` Josh Poimboeuf
2024-02-16 20:27   ` Jiri Kosina
2024-02-16 21:45     ` Theodore Ts'o
2024-02-16 21:51       ` Jiri Kosina

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=2024021557-remedial-mutilated-63c6@gregkh \
    --to=gregkh@linuxfoundation.org \
    --cc=corbet@lwn.net \
    --cc=jgross@suse.com \
    --cc=keescook@chromium.org \
    --cc=konstantin@linuxfoundation.org \
    --cc=krzk@kernel.org \
    --cc=lee@kernel.org \
    --cc=linux-doc@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux@leemhuis.info \
    --cc=lukas.bulwahn@gmail.com \
    --cc=sashal@kernel.org \
    --cc=security@kernel.org \
    --cc=workflows@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox