Received: by 2002:a05:7208:13ce:b0:7f:395a:35b6 with SMTP id r14csp273017rbe; Wed, 28 Feb 2024 21:32:11 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCXQ1WIAtURay6GOB2jTx3ez98jkX348aJYcPa6pQUODeuu2ulyLIcD7OaYWnEdWseaiCYwSrH/XAz4eVDUYXnYmNuXz3ZzJ08yFkyUsKQ== X-Google-Smtp-Source: AGHT+IE44L+Dl3sTEv3xJ4TbPuxW5WexCg1L8SUyF2Y4ovsE5MzKhkxFq25G1h867ohsFNvm0mJE X-Received: by 2002:a05:6358:7f0f:b0:17b:6f52:79e3 with SMTP id p15-20020a0563587f0f00b0017b6f5279e3mr1341541rwn.23.1709184730714; Wed, 28 Feb 2024 21:32:10 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1709184730; cv=pass; d=google.com; s=arc-20160816; b=F9gPkOnwwBD2U5uDs2vmXkReMxChkqhmqUkTmknbXeh9z1qqmWLEVwSqB81rDyvqmg jlsSIreM96+4eX1KCgdI4Af4CdESb6p6y3ml7CCD//LweamPi643XlLrCjATqHMXB22W 3SuqsJl3ahEkMpj3xj35osOO+frOpwMVWPVTB83ffeQuNcbOb7iXTRvdMHUC1O2V1ujX OXhCyvf14MMWVByjcNvPSRXJjSWoSoDK2OGJErUvMI1qUlWNKU2I3sPv8UyzvnllsX3Z 4QeY/AVA4Szwems1nW9AdfxhU7mlZvhz4ZlCwPskA3P13CQBiYBFo1VULxVALcjXWGE+ /iAw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=ovCA4mEq+pxzuOXR7naMw00o3nA7ZBwI6kWgOCsIz34=; fh=wrp7Dhnr2TmHw1/9jFzNasPfwkf8YCky7usAvt1pKL8=; b=DLxqqft0nz2+qyEF3o3Kun4knoDCSaEReUGbfxw4i6bic5wWbYFTxCgvHjzOtH0OHe f0l17gpIEaPypaVl4SW/I988a7GzhxxS72XqLIRTEnhBofe5lzRXTo1P4SAjm1oc3uN7 y/80TRufX8jGB8n7kVSscrMxgJ7+bSbgXM9iM9yVJ0snjOkfs6mWRtMh3IqXpfMQfgfV uAN60hRxfQtf1ALsVCrQbUlvDBG6qWjtEQ3+RIhEpECYV+C7GrbQU5XQTmgRq2KyiDxM WeEIrspOMY7Jx4EdmaDgnWxkGgHI5b1DOUI53nAHj/KZxtjYaMnr+iffuR+ZtKjhcB9N VbAA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Qsc9mKaA; arc=pass (i=1 dkim=pass dkdomain=linuxfoundation.org); spf=pass (google.com: domain of linux-kernel+bounces-86137-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-86137-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id bj17-20020a056a02019100b005dc50694bb3si718483pgb.718.2024.02.28.21.32.10 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Feb 2024 21:32:10 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-86137-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Qsc9mKaA; arc=pass (i=1 dkim=pass dkdomain=linuxfoundation.org); spf=pass (google.com: domain of linux-kernel+bounces-86137-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-86137-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 669932842EE for ; Thu, 29 Feb 2024 05:32:10 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 0AB333A287; Thu, 29 Feb 2024 05:32:08 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="Qsc9mKaA" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 246A23A1BF for ; Thu, 29 Feb 2024 05:32:06 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709184727; cv=none; b=o70QSXQPqSlfhBWlNnYjiOvNYVnCQm4N/lxbIZIw7K6KRYsoOpaHOzAEdcQKz9SpUsmHLFHt7x2Kf3/QR2PC3ctaYU7uw5M6eDS8Hgs494TNADBpJCoKWmZLxdMSptwbKOzp6wUBFmtr/0LDM0m+Bc+9S9zFL01xo9W7yaZNtFk= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709184727; c=relaxed/simple; bh=Gz6cyj5IxxyD9H9LT1YWjsonRagDA8CrCUTcK3stBxk=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=NenKMEPnBx+1ZLc/ONkZDTtIFl9WnOKmEPFCm/onQbcMlc2HhpztF8LRgHAHxHj5QAUNUyAKlUG7zENr3gJ0U0D3bxqQ1LGgTeHghs5r6io/7TEojYJvgzC5mByEya984+oVicNbaZ9aELjvABAzSw/6I+u7io25F6nBb777N4M= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=Qsc9mKaA; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3D2F4C433C7; Thu, 29 Feb 2024 05:32:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1709184726; bh=Gz6cyj5IxxyD9H9LT1YWjsonRagDA8CrCUTcK3stBxk=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Qsc9mKaAxJayIK4XM6LUY4Ns4dVOP8NjdPtFZK/qNdmUG85RxJ+7QkeCiswx7g3Df iv5b6a5zZbT74yP10LL9XsJQ1OX3S0o3A891T2/WMlYdasifpE0OCmy7FpLHvr1F6v tltGV/emaRYLxQ4oH7tkQ3IjXxCsgQVS8xKNQUw8= Date: Thu, 29 Feb 2024 06:32:03 +0100 From: Greg Kroah-Hartman To: Paolo Bonzini Cc: Sasha Levin , linux-kernel@vger.kernel.org, cve@kernel.org, Jiri Kosina Subject: Re: CVE-2023-52437: Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d" Message-ID: <2024022949-uncapped-crushing-e5f9@gregkh> References: <3ebbc121-8cb8-4b8d-ad5d-fb5c576e5171@redhat.com> <2024022129-expiring-resurface-146c@gregkh> <288132ea-87cf-4b56-908e-2263b6c6b67f@redhat.com> <2024022236-stock-wielder-fcbc@gregkh> <7be9ad00-1432-4a19-a954-32fa0f24fecd@redhat.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <7be9ad00-1432-4a19-a954-32fa0f24fecd@redhat.com> Sorry for the delay in response, been a busy week... On Thu, Feb 22, 2024 at 02:31:06PM +0100, Paolo Bonzini wrote: > > > Perhaps since there's no archive for cve@kernel.org, there should be a > > > public discussion mailing list (e.g. linux-cve@vger) that maintainers can > > > reply to? The private cve@kernel.org alias would then be just for the > > > request of embargoed CVEs. > > > > What's wrong with lkml for discussion? I'll add a "reply-to" to point > > there as well so that it will properly redirect if you respond to a > > message sent to the -announce list. > > Well, LKML is not the most searchable archive and subscribing to it puts > measurable stress on the kernel.org servers (mostly due to gmail > shenanigans, but still). lore is a great search tool for lkml, and you can subscribe to feeds from it very easily. > Plus (relatively) fine grained mailing lists are really cheap to subscribe > to lore/NNTP. Lore picks out stuff from lkml just as easily. > So if the reply-to points to LKML + the subsystem mailing > list for the maintainers + a new ML for the security folks (and these three > are also CC'd on the announcements, at least the last two), that would be > nice to have. I can work on patches to vulns.git, for example to integrate > with get_maintainer.pl, if you ack the idea. That might be a bit noisy, for some commits, but sure, I can see the value in being notified about a CVE for my subsystem. If you have a specific 'get_maintainer.pl' command line invocation you think would be good, I can easily add it to the scripts. > The linux-cve@ mailing list would also be a natural place to send patches to > vulns.git. Proliferation of mailing lists are a pain, I'd like to resist that for now if possible. Just use lkml and cc: cve@kernel.org if you want to send us patches. > > > * is there a limit on embargo length similar to security@kernel.org > > > > We have no embargos here, you should NOT be emailing this alias about > > any unfixed security things, the document explicitly states this. > > Wait that's not what the docs say: > > +If anyone wishes to > +have a CVE assigned before an issue is resolved with a commit, please > +contact the kernel CVE assignment team at to get an > +identifier assigned from their batch of reserved identifiers. The document also says: If you feel you have found an unfixed security issue, please follow the :doc:`normal Linux kernel security bug reporting process<../process/security-bugs>`. So _IFF_ you have an unfixed security issue that security@k.o knows about, and you MUST have a CVE id at this point in time (i.e. because it needs to be referenced somewhere), then you can email cve@k.o to get one, but the number of times I forsee that being the case based on the security@k.o workload is going to be very small. So we can take those on a case-by-case basis please, that's not going to be a normal occurrence. > So it's just that it's a lot of new work. So far the only thing for which I > can say "this sucks" is having one CVE per commit in a multi-patch fix. > That's somewhat ingrained in the operation of the bippy script, but not > unfixable (and BTW I wouldn't mind rewriting bippy in Python, but that's a > different story). Yes, the "multi-patch" issue is going to be real, and we will handle it when it happens. The current scripts don't handle that well, but they DO allow us to hand-write entries, which is probably what is going to happen for those types of rare issues. And yes, bippy in Python would be nice, but my python skills are bad (and you didn't want me writing it in perl), so I went with what I could do in the amount of time I had to get it up and running. > > I've already had soo many threads from the "Red Hat product security > > team" including flow charts and other fun things to last me quite a > > while already, and that's just in the past few days. > > Lol yeah I've seen some of those too (but only this morning---I'm not > writing on their behalf, in case that was unclear). I met with someone from Red Hat earlier this week and hopefully most of this will be resolved soon, I'm waiting to hear back from them for the issues we discussed. thanks, greg k-h