Received: by 2002:a05:7412:1e0b:b0:fc:a2b0:25d7 with SMTP id kr11csp636034rdb; Thu, 15 Feb 2024 10:25:08 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCUK6fxo5wkbS/ZE9aHmdj5r/mpyPHDuxpW28hDFdITuyvuCP5OjSTkS+zWE1UuLTEgX5ZQ6k+wwGOkI9TISj5Qpq64HiCdSVasYYIywgw== X-Google-Smtp-Source: AGHT+IHksTQLKMeOnHNycWFeqC1B134aOtmdqIxBoa6xwQXHAXeRrjbH9CpJ8QVUa11dCPbfi8o8 X-Received: by 2002:a17:90a:a883:b0:299:1aaa:5ff with SMTP id h3-20020a17090aa88300b002991aaa05ffmr1733118pjq.7.1708021508190; Thu, 15 Feb 2024 10:25:08 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708021508; cv=pass; d=google.com; s=arc-20160816; b=lRnnE4qsMLmF5Swcum84s/r2LwwKNLULMRt/DkeOOmQgmLTbBTv+AIIVKhPEgSOusk DpncIKGszCUtGQ7h3bk8Js7Hj/fCgltD6vzP7gRmLPg6VhkXDaBt+ztmaa5ff2KWchGe 8EB0sSNRE8AAaZBF7Y0QQR2ugXR7Od+kWM0R+hoGBNBLSILlpA2bhK+M/sJr+DQRO5Wo stF49qMy0I4ZqknRyoOCNwL8rxWov8K29vadXXIy2mlrvC4DwGZFX6HgO0iy2H2gVbYW 9Pam1OiXCNbXj2JnIJ5GR7kmMlAlKA6UEhLiHpHFyOa+v7TekJ0jtTQxW2u00fhY0ENO pSyA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=0uf5Jj2rIA6xnq05jcnP/kD0co+sl5oNQJrwMYj/mrw=; fh=NxUyvahMTxE7JTr/bQ8dlmb21K83H1sgQiWByef/sEM=; b=UD3mZRWZsczYwjpzxleb35twAXOG94zipebNRL3wttlYPiu5ixJW6Vfty3lLbCucJr 0t/DPje0O0xInm0rL85lNlnYRgmJytMqwACNiMxJ5jZ4vYYRSdvpq2bjfehmFUi9vTuT 5Ja/B0wPK0h9lAnEo7M5gN6vmKDvp0OXyJ5zOhh0Zhgb9yn+hBciBl1sYv5GCjjGOWBL v7iBIDZGbJLVCyvvo2y+7Bmwr8FjjAUh7lDEDZQ8IfaPpyZ3FD/8K6Cd/l7jCuuufzJJ Tf2UHEVCpDmIFah2b+5RI4jGnAJGAiRj0EInLL8PpCbe+W+8IsNiiwnDcL/qrKzZ0n27 PswA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=jKWelaQu; arc=pass (i=1 dkim=pass dkdomain=linuxfoundation.org); spf=pass (google.com: domain of linux-kernel+bounces-67490-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-67490-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id m2-20020a17090a4d8200b00298c645db9esi3316672pjh.104.2024.02.15.10.25.07 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 15 Feb 2024 10:25:08 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-67490-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=jKWelaQu; arc=pass (i=1 dkim=pass dkdomain=linuxfoundation.org); spf=pass (google.com: domain of linux-kernel+bounces-67490-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-67490-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 121082817A5 for ; Thu, 15 Feb 2024 18:24:34 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id F075E1386B8; Thu, 15 Feb 2024 18:24:27 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="jKWelaQu" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0BE5E1384BE; Thu, 15 Feb 2024 18:24:26 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708021467; cv=none; b=XJTE4ym2YvqQq0XR/bQdnv75OuUwTXIWiTLbaHygPtZhr/QuC2IedumJxV09lWcmuRcdplE0TJsM5F5M0clUz5v0CwGethQfDbeT49F0YjDtx46p+0kSInp7WJBXyfbFBmNvw+hw+KhE+IIPu8cRiIBy15dkoX3MmGmkWuBF2fs= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708021467; c=relaxed/simple; bh=2T1+tvt60SNf30Xn2WusR7S21+ZI/B1zECY9WVy1KOQ=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=A4Y3je2bRlzHD9ILDuwqv+nNkNhZm+hq0fwnei1CM/mCA6qhgrNtrEPJ+wMrOHnRdm4ami18eFcY21Jbal+JlP1X8aZxqSh8FAqYo794fXW/Hw5mkir9FZHbcurkZPY9zTc8Ax+gynGuzkl6ezX97whHD4R9GkpdmJ0a3mVVIiU= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=jKWelaQu; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1A1D4C433C7; Thu, 15 Feb 2024 18:24:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1708021466; bh=2T1+tvt60SNf30Xn2WusR7S21+ZI/B1zECY9WVy1KOQ=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=jKWelaQu2i9X85eLTdggrei6BKe1RVOeFvagBnpBABHBGiej8YsSNf/0uM9/aVlD1 AwMfgHfocQWRExmyxe9wh00/v/w7jmE9AtW4fPsZXrnNibH2Vq4SbkQSCV/7sGwssY YzpC6X1qf1OInyZjZwWXeaBpmVDPnCXTWO/w1L7c= Date: Thu, 15 Feb 2024 19:24:23 +0100 From: Greg Kroah-Hartman To: Jiri Kosina Cc: corbet@lwn.net, workflows@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, security@kernel.org, linux@leemhuis.info, Kees Cook , Konstantin Ryabitsev , Krzysztof Kozlowski , Lukas Bulwahn , Sasha Levin , Lee Jones Subject: Re: [PATCH v4] Documentation: Document the Linux Kernel CVE process Message-ID: <2024021527-shove-bodacious-e624@gregkh> References: <2024021500-laziness-grimace-ed80@gregkh> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: On Thu, Feb 15, 2024 at 06:38:05PM +0100, Jiri Kosina wrote: > On Thu, 15 Feb 2024, Greg Kroah-Hartman wrote: > > > The Linux kernel project now has the ability to assign CVEs to fixed > > issues, so document the process and how individual developers can get a > > CVE if one is not automatically assigned for their fixes. > > There is still one thing that's not clear to me with this new process, and > that's how embargos are going to be handled. > > Currently, the process is broken as well, but at least understood by > everybody. > > - issues are reported to security@kernel.org. No CVE assigned, 7days > embargo, then fix gets pushed out > > - at some point (in parallel, before, or after the above), the issue gets > reported to linux-distros@. CVE gets assigned, and downstreams start > integrating the fix (once available) to their codebase. linux-distros is not allowed to assign a CVE id for a Linux kernel fix, so this will not happen here anymore. They HAVE to contact cve@kernel.org in order to do this as no one else is allowed to create a CVE entry for Linux unless some very extreem things happen that I do not plan on ever having happen to us (see the CNA rules for details.) > - embargo is lifted, fixes are released with proper CVE reference > > How is the new process going to look like? Please keep in mind that > linux-stable is (by far!) *not* the only downstream of Linux Kernel > project. I agree, and again, linux-distros will not be assigning CVEs for issues that affect the currently supported kernels as listed on kernel.org, nor will any other group, so this shouldn't be an issue as we can coordinate properly if the above senario happens. > We've had this discussion in other contexts already, but I whole-heartedly > believe that it's in no way in the Linux Kernel project's interest to kill > those other downstreams (read: Linux distros) (*) ... or is it? I have no interest in doing anything about linux-distros, just that they are not allowed to assign a new CVE for Linux anymore as of Tuesday this week, and neither is any other CNA, just like they are not allowed to assign a CVE for Windows today, no difference at all. thanks, greg k-h