Received: by 2002:a19:771d:0:0:0:0:0 with SMTP id s29csp1274956lfc; Wed, 1 Jun 2022 13:53:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwUb6jQNR6Qsl0cXxi10doGZ/zb/o7n9e9+U5pcULtUmM7022FY8aN9w9wX8J2hyOnvlHDW X-Received: by 2002:a17:90b:3506:b0:1e0:51a1:a8ee with SMTP id ls6-20020a17090b350600b001e051a1a8eemr1283230pjb.112.1654116795224; Wed, 01 Jun 2022 13:53:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1654116795; cv=none; d=google.com; s=arc-20160816; b=kVQ76A4Hr4lmKUeKbtAe2agctTiG9KzWFobp0cyxPjA7hLyyWL7vs00pf01OfzwKII xoyATFxzXu0tfItaAWwx1oGBpFSQbRsnahSDGiEpQe6xCVyT7pj82r47JuSQj6GC2tNx K2RIAlRGe3bgokG2toyVxMSVGD7zogssg08X35sR3+SBzIacGTlpjMZ6tCcdCCYfXe+1 CIh4j2NJUk9hQElglJfZi7KVxNJgWpGLwughBIK/rpdlhVzOGSOmyU838IqozjgEJq44 h/yECAV+DQJeagoRr3sqqUjv0gULtEyCdSpfMk6PTKjSi1V6Q8g+PKiuLYlXLwcFfyhX 30hg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from:dkim-signature:dkim-filter; bh=iM1gTdQgfAuBfQa3sOYlXR+O5U2vnXeo1TB17L2Db6I=; b=wE23/Dl4+8QXdkz7oxJ+8B1/PeTTTQY2kdBxioOfRGomhMwfDxO+AGH/YBDyJZ3XAm 6Li+YWInJMyjDRwZoATN6+L4fZBo6EOmID91l0na4lrdiFgQM/oelRy4rXjQcizv+mlZ 4o2H4Cwg53XeFd9cUEcavOZO3Sg6BcTvR+RjdF+RxqpdcvDcglCBJZDsarWE2UIuyWcK TudF+4kewdk2CU2ZrBH7kLBiIDMgcDG9MhivDdU2qG6ShLbQV1773wTo4Z18kX99UjP4 cRIR71yyoJNgSVeIs5BwGaaBZjMzJmSVnkm3/o76dg/B5SEkEMpDSF8YeEUyTFV0OdR6 sZlw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@lwn.net header.s=20201203 header.b=WJ7QNIqS; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id e24-20020a631e18000000b003c668342553si3599747pge.351.2022.06.01.13.53.14 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 01 Jun 2022 13:53:15 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@lwn.net header.s=20201203 header.b=WJ7QNIqS; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 8400B2ADF7A; Wed, 1 Jun 2022 12:55:56 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1356059AbiFAQ6r (ORCPT + 99 others); Wed, 1 Jun 2022 12:58:47 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57056 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1354317AbiFAQ6p (ORCPT ); Wed, 1 Jun 2022 12:58:45 -0400 Received: from ms.lwn.net (ms.lwn.net [IPv6:2600:3c01:e000:3a1::42]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 98E2284A0B; Wed, 1 Jun 2022 09:58:41 -0700 (PDT) Received: from localhost (unknown [IPv6:2601:281:8300:73::5f6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ms.lwn.net (Postfix) with ESMTPSA id C3F8D2C3; Wed, 1 Jun 2022 16:58:40 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 ms.lwn.net C3F8D2C3 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lwn.net; s=20201203; t=1654102720; bh=iM1gTdQgfAuBfQa3sOYlXR+O5U2vnXeo1TB17L2Db6I=; h=From:To:Cc:Subject:In-Reply-To:References:Date:From; b=WJ7QNIqSlBYZsXHKuPOyYrcBHyL2dlZgIShiNGRfYmN768mLEcpGGz192/jNlVdnt wGKSFbB9nRmX16KFjSw/yuExh8g8aJebpskqT6ezPhrFr23xp2mnAw5kbwCIEmj2Il m0QNUtjgoxIp2QEKgTbX9je2ZX2SSGpeHr00tzfSQwU71/0htsHItnZHfvPUapoLSJ VYWwmN8XYWaImIeI6lromuZ0/eHAJ9BM/JbTpq9VgkmGw6xOkbuuQ3DA8CTnkgpDuM fX6iqBuS1dkVmFhB5Tc7ik7yyCdHpkKSG8PlxS6u0wMLLxiEQFoQnuibDy1peoRmTg ZuiKD9txUL2bw== From: Jonathan Corbet To: Vegard Nossum , linux-doc@vger.kernel.org Cc: linux-kernel@vger.kernel.org, Vegard Nossum , Amit Shah , Dave Hansen , David Woodhouse , Greg Kroah-Hartman , "Gustavo A . R . Silva" , Jiri Kosina , Kees Cook , Linus Torvalds , Mauro Carvalho Chehab , Paolo Bonzini , Peter Zijlstra , Solar Designer , Thomas Gleixner , Thorsten Leemhuis , Will Deacon , Willy Tarreau Subject: Re: [PATCH] Documentation/security-bugs: overhaul In-Reply-To: <20220531230309.9290-1-vegard.nossum@oracle.com> References: <20220531230309.9290-1-vegard.nossum@oracle.com> Date: Wed, 01 Jun 2022 10:58:50 -0600 Message-ID: <87fsko48xh.fsf@meer.lwn.net> MIME-Version: 1.0 Content-Type: text/plain X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Vegard Nossum writes: > The current instructions for reporting security vulnerabilities in the > kernel are not clear enough, in particular the process of disclosure > and requesting CVEs, and what the roles of the different lists are and > how exactly to report to each of them. > > Let's give this document an overhaul. Goals are stated as a comment at > the top of the document itself (these will not appear in the rendered > document). OK, some other thoughts... [...] > +Linux kernel security team at security@kernel.org, henceforth "the > +security list". This is a closed list of trusted developers who will > +help verify the bug report and develop a patch. > + > +While the security list is closed, the security team may bring in > +extra help from the relevant maintainers to understand and fix the > +security vulnerability. > + > +Note that the main interest of the kernel security list is in getting > +bugs fixed; CVE assignment, disclosure to distributions, and public > +disclosure happens on different lists with different people. Adding "as described below" or some such might be helpful for readers who are mostly interested in those things. > +Here is a quick overview of the various lists: > + > +.. list-table:: > + :widths: 35 10 20 35 > + :header-rows: 1 > + > + * - List address > + - Open? > + - Purpose > + - Members > + * - security@kernel.org > + - Closed > + - Reporting; patch development > + - Trusted kernel developers > + * - linux-distros@vs.openwall.org > + - Closed > + - Coordination; CVE assignment; patch development, testing, and backporting > + - Linux distribution representatives > + * - oss-security@lists.openwall.com > + - Public > + - Disclosure > + - General public Please don't use list-table, that's totally unreadable in the plain-text format. How about something like: =============================== ===== ================= =============== List address Open? Purpose Members =============================== ===== ================= =============== security@kernel.org no Reporting Trusted kernel developers Patch development linux-distros@vs.openwall.org no Coordination Distribution representatives CVE assignment Patch development Testing Backporting oss-security@lists.openwall.com yes Disclosure General public =============================== ===== ================= =============== (Note I haven't tried to format this, there's probably an error in there somewhere). > +The following sections give a step-by-step guide to reporting and > +disclosure. > + > +Contacting the security list > +---------------------------- > + > +As it is with any bug, the more information provided the easier it will > +be to diagnose and fix; please review the procedure outlined in > +Documentation/admin-guide/reporting-issues.rst if you are unclear about > +what information is helpful. Any exploit code is very helpful and will > +not be released without consent from the reporter unless it has already > +been made public. > + > +The security team does not assign CVEs, nor does it require them > +for reports or fixes. CVEs may be requested when the issue is reported to > +the linux-distros list. > + > +**Disclosure.** The security list prefers to merge fixes into the > +appropriate public git repository as soon as they become available. More to the point, the idea is to get *review attention* onto the patches, presumably before they are commited to some repo, right? That's my understanding from the oss-security discussion, anyway. So the first disclosure may not be when it shows up in a repo, as suggested here. [...] > +Once a patch has been developed, you are encouraged to contact the > +linux-distros list; see below. Nit: "see below" seems unnecessary when "below" is the next line down > +Contacting the linux-distros list > +--------------------------------- > + > +Fixes for particularly sensitive bugs (such as those that might lead to > +privilege escalations) may need to be coordinated with the private > +linux-distros mailing list (linux-distros@vs.openwall.org) so that > +distribution vendors are well prepared to release a fixed kernel as soon > +as possible after the public disclosure of the upstream fix. This > +includes verifying the reported issue, testing proposed fixes, > +developing a fix (if none is known yet), and backporting to older kernels > +and other versions. > + > +The linux-distros list can also help with assigning a CVE for your issue. > + > +**Disclosure.** The linux-distros list has a strict policy of requiring > +reporters to post about the security issue on oss-security within 14 days > +of the list being contacted regardless of whether a patch is available or > +not. It is therefore preferable that you don't send your initial bug > +report to the linux-distros list unless you already have a patch for the > +issue. > + > +**List rules.** The main rules to be aware of when contacting the > +linux-distros list are: So this seems certain to go out of date when the other list's rules change. I wonder if it would be better just to tell readers they need to be aware of that list's rules and give a pointer? Thanks, jon